Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

risk report

Results 126 - 150 of 162Sort Results By: Published Date | Title | Company Name
Published By: Forrester     Published Date: Feb 24, 2014
Most brands would love to have their apps the top 25 most downloaded in the Apple App Store or Google play. With more than one million apps available, there's a great risk that your app wont stand out from the crowd. In this Forrester report, learn the 7 best practices to promote your app.
Tags : 
forrester, apps, google play, apple app, itunes, promoting, promote, marketing
    
Forrester
Published By: ForeScout     Published Date: Mar 28, 2017
This research report identifies seven IoT devices that can be hacked in as little as three minutes and make organizations extremely vulnerable to attack. The ubiquity of these devices is a recipe for disaster that must be addressed through visibility and control of devices on the network.
Tags : 
forescout, risk, report, hackable, enterprise
    
ForeScout
Published By: ForeScout     Published Date: Nov 16, 2017
"Cyberattacks on Internet of Things (IoT) and operational technology now expose businesses to greater risk. But, with all the security technology available today, we asked ourselves the question, why do they keep happening? ForeScout commissioned Forrester Consulting to see if organizations can adequately and accurately secure their networks with the rise of IoT-connected devices. Read the Report to learn more about the findings.
Tags : 
    
ForeScout
Published By: IBM     Published Date: Jul 30, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, business analytics, finance, closing, consildating, reporting, reporting process, internal control management, risk reduction, consolidation, financial statement consolidation, regulatory reports consolidation
    
IBM
Published By: IBM     Published Date: Sep 16, 2014
To compete in today’s rapidly changing business environment, organizations need to capture, analyze and act on information rapidly. If they can quickly identify trends, discover patterns and generate new insights, they can address a wide array of strategic and operational goals—from increasing customer loyalty and creating targeted marketing offers to enhancing operational efficiency and reducing risk. In their report, Business Value of Big Data on Power Systems, NC State University talks about unlocking the business value of big data, and how IBM Power Systems can deliver the foundation for organizations to bring insight to the point of impact faster.
Tags : 
big data, targeted marketing offers, ibm power systems, structured data
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
Your business depends on the easy, secure movement of data. But if you’re using outdated technologies and unsecure file transfer protocol (FTP), you’re exposing your organization to risk—and driving up costs as well. Use the FTP Risk Advisor to find out your risk level, and get a customized report with recommended actions you can take to protect your files—and your business.
Tags : 
ibm, secure data movement, risk advisor, file transfer protocol, risk report, file protection
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, enterprise applications, network security
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: IBM     Published Date: Oct 03, 2017
Many new regulations are spurring banks to rethink how data from across the enterprise flows into the aggregated risk and capital reports required by regulatory agencies. Data must be complete, correct and consistent to maintain confidence in risk reports, capital reports and analytical analyses. At the same time, banks need ways to monetize, grant access to and generate insight from data. To keep pace with regulatory changes, many banks will need to reapportion their budgets to support the development of new systems and processes. Regulators continually indicate that the banks must be able to provide, secure and deliver high-quality information that is consistent and mature.
Tags : 
data aggregation, risk reporting, bank regulation, enterprise, reapportion budgets
    
IBM
Published By: SAS     Published Date: Oct 03, 2018
Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining what’s possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to: • Protect from reputational, regulatory and financial risks. • Reduce the cost of fraud and financial crimes prevention. • Gain a holistic view of risk across functions. • Include cyber events in regulatory report filings. In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.
Tags : 
    
SAS
Published By: IBM     Published Date: Apr 22, 2014
Researched and compiled independently by Chartis, the RiskTech100® evaluates and ranks the world’s most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech® 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.
Tags : 
ibm, chartis, risktech100, risk technology, risk technology vendors, security, risk, compliance
    
IBM
Published By: Cisco     Published Date: Feb 16, 2016
The need for threat-focused next-generation firewalls (NGFWs) that can effectively mitigate risks that traditional unified threat management (UTM) and point solutions cannot is highlighted by numerous studies, including one from Cisco that reported that every organization should assume it has been hacked. Cisco threat researchers found malicious traffic was visible on 100 percent of the corporate networks that they observed, with evidence that adversaries had often penetrated those networks and were frequently operating undetected over a long period.
Tags : 
network security, threat management, network management, security
    
Cisco
Published By: DocuSign     Published Date: Apr 24, 2018
"In order to succeed in this evolving digital landscape, financial services institutions must embrace trending technology to remain competitive or risk becoming obsolete. Today’s customers expect to be able to bank not just anywhere, any time, but also on any device. What’s more, they want to be able to open new accounts, apply for loans, and perform other tasks that in the past could only be done at a branch, securely and easily. Download this complimentary IDG report to learn about digital banking best practices to stay competitive by going paperless, attract and keep the next generation of customers who demand digital options, and thrive in the digital age. "
Tags : 
    
DocuSign
Published By: IBM     Published Date: Jan 09, 2015
This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.
Tags : 
security solutions, it security, security risks, threat intelligence report, malware, botnet infections, security, it management, enterprise applications
    
IBM
Published By: SAS     Published Date: Feb 09, 2016
This report from Chartis provides an independent evaluation and description of leading practices from SAS as well as its competitive position in the market using the Chartis RiskTech Quadrant® for Enterprise Stress Testing Systems. This report also includes a brief look at: • The demand side trends outlining key business and regulatory challenges. • The supply side focusing on the technology landscape for enterprise stress testing. The RiskTech Quadrant® uses a comprehensive methodology of in-depth independent research and a clear scoring system to explain which technology solutions meet an organization’s needs. Chartis considers SAS to be one of the leading vendors of enterprise stress testing systems for the financial services industry.
Tags : 
sas, chartis, enterprise stress testing system, best practices, it management, wireless
    
SAS
Published By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team, security
    
Symantec
Published By: Progress Software     Published Date: Mar 12, 2014
Progress Software and Saugatuck Technology have come together to provide this Saugatuck Strategic Report which provides guidance to ISVs in transition not just to the Cloud – but to entirely new ways of doing business, new requirements from customers and partners, and new opportunities that enable significant reward, and related potential risk. This report shares not only Saugatuck’s analysis of key market shifts, and the key challenges faced by ISVs in these transitions, but also provides ISVs with critical success factors and best practices from more than seven years of Saugatuck Technology research and business consulting with a diverse range of software providers around the world.
Tags : 
progress software, saugatuck technology, isv, best practices, business challenges, cloud transition, technology challenges
    
Progress Software
Published By: NAVEX Global     Published Date: Dec 22, 2017
Knowing which steps to take to ensure your organisation remains vigilant against bribery and corruption is an important move. When your organisation is aligned on anti-bribery and corruption policy, training and third party risk, your employees can identify, report and ultimately stamp out—bribery and corruption. Our Solutions Experts can help you strengthen your most challenging ABC issues and better protect your organisation. Contact us to set up a consultation today at info@navexglobal.com.
Tags : 
anti-bribery programme, anti-bribery and corruption, corruption risk assessment, anti-bribery checklist, preventing anti-bribery, corruption assessment
    
NAVEX Global
Published By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : 
quocirca, outsourcing, security, networking, software development
    
Quocirca
Published By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
    
OneNeck IT Services
Published By: Click Forensics     Published Date: Jun 25, 2008
What is click fraud?  Who is committing it?  Why should you be concerned about your paid search campaigns?  Learn how to identify if you are at risk with this special report from Click Forensics.
Tags : 
click fraud, ppc, paid search, roi, click forensics, pay per click, pay-per-click, fraud, budget
    
Click Forensics
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
Since the National Association of Insurance Commissioners (NAIC) made revisions to the Financial Reporting Model Regulation (Model Audit Rule) in June 2006, the insurance industry’s attention to the risks associated with financial reporting has been on the rise. Structured similarly to Section 404 of the Sarbanes‐Oxley Act, the Model Audit rule places a significant burden on C‐level executives to ensure their oversight in the internal controls for financial reporting (ICFR) process. Executives within these insurance organizations, both public and private, will be required to evaluate their internal controls in preparation for the first reports due in 2010 for the 2009 reporting period.
Tags : 
prodiance, sarbanes‐oxley act, security and integrity of data, analytics, risk assessment, optimization, security, it management, monitoring
    
Prodiance Corp.
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.