Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

minimize risk

Results 1 - 25 of 64Sort Results By: Published Date | Title | Company Name
Published By: Resolver     Published Date: Nov 01, 2019
As risk professionals, you’re tasked with the responsibility to minimize and mitigate risk, all while battling skeptical and reluctant executives for increased budget and more resources. The risk management paradox is a tough pill to swallow. When you’re doing your job well, nobody notices. And when something goes wrong, you’re the scapegoat. So, how do you prove the value of something not happening? In partnership with The Risk Management Society (RIMS), Resolver hosted a webinar to answer questions many risk managers struggle with: - How do you prove the value of an ERM program? - Who is ultimately responsible for risk management? - What metrics and KRIs should you track to measure the impact of your ERM program? - How do you encourage risk-based decision making across the enterprise? - How can technology be leveraged to maximize the value of an ERM program? Complete the form for access to the full webinar video that will help your team make the case for an ERM program.
Tags : 
    
Resolver
Published By: SAP Concur     Published Date: Sep 25, 2019
"This IDC study reviews the competitive market for travel and expense management software in 2018. ""Industry leaders need to leverage advanced technologies to augment their capabilities for streamlining approvals, combating fraud, and maintaining compliance. Many of these technologies have taken large leaps forward in terms of usability and accuracy over the past 24 months,"" said Kevin M. Permenter, research manager for Enterprise Applications with IDC. There is no magic formula to rid the business of the burden of noncompliance. Download this report to find out how organisations can minimize risk for noncompliance and fraud amidst rapid international growth. "
Tags : 
    
SAP Concur
Published By: Icertis     Published Date: Aug 06, 2019
Real-world examples of how large enterprises were able to minimize risk, reduce costs and realize the full potential of their contractual relationships
Tags : 
enterprise contact management, contract management software
    
Icertis
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Today's businesses need to drive innovation to seize new opportunity, but cloud complexities can slow the agility needed for that innovation. That doesn't have to be the case. In fact, over fifty percent of organizations now use a multi-cloud strategy to help determine their cloud needs, and if you don't have one, we can help. Citrix Workspaces helps reduce cloud complexity, minimize security risks, and deliver a better user experience. Download our e-book and find out how a secure digital workspace: • Centralizes workspace management • Secures your SaaS and web apps, data, and clouds • Makes it a lot easier to scale your cloud infrastructure as needed
Tags : 
    
Citrix ShareFile
Published By: Coupa     Published Date: Dec 14, 2018
Business Spend Management Improves Visibility and Control Over Spend for Financial Leaders Closing the books can be a tedious, manual process when accrual balances don’t match AP balances and a backlog of invoices cause an increase in resource hours. Get insight on how Salesforce and Ionis Pharmaceuticals leverage business spend management to streamline the financial close. Read this eBook to learn how to: • Automate spend processes to cut heavy manual workloads • Gain full visibility and control over spend • Move from transactional “spreadsheet jockey” to strategic management • Minimize risk associated with missed accruals
Tags : 
    
Coupa
Published By: Staples     Published Date: Oct 24, 2018
Cybersecurity risks don’t begin and end with your PCs. Watch this webinar to hear HP’s top security expert Ron Chestang detail some surprising security issues lurking in your print network and outline specific controls you can use to minimize the risk.
Tags : 
mps, cybersecurity, print security, managed print, print networks, network security, it security, security
    
Staples
Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: Kronos     Published Date: May 30, 2018
Learn how your organization can develop a high-performance workforce that drives bottom-line results with this Time and Attendance Solution Guide. • Get the most from your workforce — and your budget — as you gain valuable insight • Ease the compliance challenge and ensure workplace fairness • Boost productivity by empowering employees to do more with less Download the guide to see how Kronos Time and Attendance can help your organization engage the workforce, control labor costs, minimize compliance risk, and improve workforce productivity.
Tags : 
    
Kronos
Published By: Fiserv     Published Date: Nov 08, 2017
Featuring Andy Schmidt, Principal Executive Advisor Knowing your customer is key to driving a successful strategy for client security and retention. Watch this video to get a picture of how KYC can be deployed for risk minimization, work with compliance, and make security measures more frictionless using cutting edge technology.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: XpertHR     Published Date: Oct 23, 2017
Use this guide to: Understand key challenges facing multistate employers; Learn ways to minimize risks of fines and penalties resulting from mismanaged multijurisdictional compliance obligations; and Get practical advice to effectively manage the varying compliance obligations across jurisdictions.
Tags : 
    
XpertHR
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Today's internet-dependent business landscape demands frequent system changes, higher throughput and increased reliability. If your new features and fixes do not hit the digital market quickly, user experience, customer retention and revenue all take a hit. DNS however, is a tool that can be used to both mitigate problems and optimize the performance and delivery of these systems. Read the latest O'Reilly book to understand how the DevOps approach combined with the fundamentals of DNS can: • Use DNS as a means of distribution, deployment and high-availability • Mitigate failure and minimize risk • Improve system reliability and management Get the O'Reilly Book! "
Tags : 
    
Oracle + Dyn
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, itdiscusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: NETIQ     Published Date: Jan 12, 2017
Today’s attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
    
NETIQ
Published By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
Published By: IBM     Published Date: Nov 10, 2016
Today’s Digital Business needs a strategy for business content – one that spans the creation, capture, activation and analysis of it – which assures security, compliance with regulations, and minimizes risk. This session will confront content chaos and its impact on business agility. We will share stories from IBM customers who are using business content solutions to deliver on the promise of the Digital Business today. Many are using ECM Centers of Competency to bring together all stakeholders in the business to create a unified vision for information management across all departments and all forms of data and content, whether on-premises, mobile, or in the cloud.
Tags : 
ibm, analytics, ecm, digital business, enterprise applications
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, security, big fix, advanced threats, security, security intelligence, endpoint security, networking, enterprise applications
    
IBM
Published By: TriNet     Published Date: Sep 13, 2016
This factual guide covers ACA definitions, regulations, mandates, forms that need filing, deadlines for filing, and potential penalties for employers. Whether you’re a small or midsize business, this complex law presents challenges that TriNet can help you manage and comply with.
Tags : 
trinet, hr technology, minimize risk, hr employment recruitment, co-employment, three-point relationship, talent market
    
TriNet
Published By: IBM     Published Date: Jul 15, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, security intelligence, bigfix, technology, best practices, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, ibm bigfix, ibm security qradar, risk management, endpoint intelligence, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Just as business intelligence helps enterprises make decisions that maximize opportunities and minimize business risks, security intelligence enables them to better detect threats, identify security risks and areas of noncompliance, and set priorities for remediation. One of the most compelling arguments for security intelligence is operational efficiency, or better use of people, time and infrastructure. This white paper discusses how security intelligence is an essential ingredient to comprehensive and cost-effective information security.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud siem, security intelligence event management, security, enterprise applications, network security
    
IBM
Published By: Eaton     Published Date: Jan 26, 2016
When working with data center and commercial facility electrical systems, shocks of 100mA to more than 2,000mA are possible—definitely in the realm of serious harm to humans and property. Energized electrical equipment also presents the risk of arc flash caused by electrical faults that produce powerful explosions. When dealing with commercial and industrial electrical systems, such as uninterruptible power systems (UPSs) and their batteries, data center and facilities managers need to be aware of these risks, especially since some repair and maintenance procedures require working with a unit that is still energized. There are ways to minimize the risks to employees, equipment and the field technician performing the service. This paper answers some common questions about UPS maintenance, how to reduce the risks associated with servicing UPSs and batteries, and how to qualify a UPS service provider.
Tags : 
eaton, ups safety, data center, arc flash, energized electrical equipment, facility managers, ups maintenance, it management, enterprise applications
    
Eaton
Published By: IBM     Published Date: Jan 07, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, threat, endpoint, security, intelligence, qradar
    
IBM
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.