de risk

Results 1 - 25 of 1742Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Learn how Small and mid-sized businesses (SMBs) that are leveraging Hybrid Cloud are seeing several critical benefits. Based on new Aberdeen research, these gains and benefits are even more vital for today’s organizations. With hybrid cloud, your SMB can reduce downtime, cost and risk while increasing flexibility and scalability.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Learn why replacing servers is often delayed. Confronted with competing business priorities, limited budgets and personnel, and a sense of comfort as current servers reliably hum along, delay is easy to rationalize. Yet, delays are not without risk and trade-offs. Cases in point are two circumstances that small and midsized enterprises should seriously consider and, in our opinion, initiate action now. Discover why the new era of cyber warfare aimed at exploiting hardware vulnerabilities and the End-of-Support for Windows Server 2008/2008 R2 means delaying server replacement leaves SMB IT open to risk.
Tags : 
    
Hewlett Packard Enterprise
Published By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS
Published By: RMS     Published Date: Jul 25, 2019
The insurance industry boasts some of the most sophisticated modeling capabilities in the world. And yet the average property underwriter does not have access to the kind of predictive tools that carriers use at a portfolio level to manage risk aggregation, streamline reinsurance buying and optimize capitalization.
Tags : 
    
RMS
Published By: RMS     Published Date: Jul 25, 2019
U.S. Flood is a high-gradient, intricate peril incorporating various sources, and causing a variety of effects. It requires sophisticated models, data science, and analytics technology to properly understand and assess each risk.
Tags : 
    
RMS
Published By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
    
Entrust Datacard
Published By: Riskified     Published Date: Aug 06, 2019
Legacy fraud detection systems often approve or decline orders based solely on a handful of order details. Modern solutions are far more sophisticated, instantly considering hundreds of data points for each order, resulting in more accurate decisions. Savvy merchants expect much more from their fraud management solutions than simply a risk score.
Tags : 
    
Riskified
Published By: Riskified     Published Date: Aug 06, 2019
As the global eCommerce market grows and fraudster methodology evolves, new fraud management approaches and tools are being introduced at a fast pace. Trying to stay on top of developments in the eCommerce fraud prevention landscape can be overwhelming and time consuming. Riskified is proud to present the eCommerce Fraud Solution Buyer’s Kit, a comprehensive series of resources designed to guide executives, decision makers, and procurement professionals through the process of assessing current fraud management performance and understanding which available approaches and solutions can best meet their needs.
Tags : 
    
Riskified
Published By: Riskified     Published Date: Aug 06, 2019
Fraud is scary, and there are many valid reasons for merchants to decline suspicious transactions in the name of fraud prevention. But often, in the quest to avoid abuse, risk-averse vendors take defensive measures too far. According to industry data, the average merchant loses 5.5% of their revenue to false declines — perfectly legitimate orders, rejected because they seem suspicious.
Tags : 
    
Riskified
Published By: Riskified     Published Date: Aug 06, 2019
In the competitive world of eCommerce, online retailers must provide an optimal customer experience or risk losing business. But many are seeing their hardearned revenue fall victim to costly credit card chargebacks.
Tags : 
    
Riskified
Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: Infinidat EMEA     Published Date: May 14, 2019
Even after decades of industry and technology advancements, there still is no universal, integrated storage solution that can reduce risk, enable profitability, eliminate complexity and seamlessly integrate into the way businesses operate and manage data at scale? To reach these goals, there are capabilities that are required to achieve the optimum results at the lowest cost. These capabilities include availability, reliability, performance, density, manageability and application ecosystem integration? This paper outlines a better way to think about storing data at scale—solving these problems not only today, but well into the future?
Tags : 
    
Infinidat EMEA
Published By: Icertis     Published Date: Aug 06, 2019
Sell-side contracts are vital to companies’ bottom lines. By managing them on a unified, cloud-based contract management platform, enterprises can accelerate and optimize their sales processes while driving down risk.
Tags : 
enterprise contact management, contract management software
    
Icertis
Published By: Dell EMC     Published Date: Aug 01, 2019
Companies face a challenging decision in this digital era ? use technology to purposefully disrupt their organization and unlock new opportunities or wait and risk being disrupted by others. To keep pace in an ever-accelerating digital environment, companies need to transform their entire organization through technology. Download this eBook from Dell EMC and Intel® to learn how to modernize your business and become a digital innovator.
Tags : 
    
Dell EMC
Published By: Epicor     Published Date: Apr 11, 2019
With the speed at which technology is advancing, manufacturers cannot afford to use outdated manufacturing software. “Legacy” manufacturing management systems drag down your company with inefficiencies that are both apparent and hidden. These can prevent you from keeping up with your competition and achieving your growth potential. This Epicor white paper details why manufacturing industry technology experts say delaying this important business decision often places your company at risk. By using legacy manufacturing software, not only are you unable to tap into the latest technology trends, but you leave your business vulnerable to: • Duplicate or inaccurate data • Clunky system performance • Security concerns A modern manufacturing ERP solution can eliminate these risks. Download the white paper to learn why implementing new manufacturing software built for business growth may be the most important step you take for the success of your company.
Tags : 
erp, manufacturing, industry 4.0
    
Epicor
Published By: Jamf     Published Date: Aug 06, 2019
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Published By: MeQuilibrium     Published Date: Aug 01, 2019
No matter how you slice it, the most important thing businesses can do in turbulent times is increase their ability to adapt to change. Experts call this agility. What many experts leave out, however, is that agility alone is not enough. Employees need resilience too. Our research shows six personas hidden in almost every workforce — based on an employee’s levels of agility and resilience — and how to help each one manage stress amid change. In this e-book, you’ll discover that one persona in particular has a higher risk of burnout than all the others and for one reason: These employees are high in agility but low in resilience. In this e-book, we’ll take a look at these personas to help you see who’s who in your organization and: • Better understand your workforce • See how many of your people are affected by change • Provide strategies for those who are stressed and burned out Help your people with what’s affecting their work and personal lives by analyzing these six workplac
Tags : 
    
MeQuilibrium
Published By: SailPoint Technologies     Published Date: Aug 02, 2019
Find out how cloud identity governance cost-effectively reduces security and compliance risk, while also providing timely access to information. Download the brief.
Tags : 
    
SailPoint Technologies
Published By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how it’s evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: SAS     Published Date: Jun 26, 2019
To support open government initiatives and uphold the values of transparency, participation and collaboration in the US, federal agencies today make their data open, or publicly accessible. Citizens can use this open data to assess college affordability, the economy, educational issues, environmental damage, health care, taxes, agriculture, the climate and more. Governments can use APIs to pull this open data into SAS Visual Analytics as a way to identify trends and patterns and obtain all sorts of new insights. With public health surveillance, for example, governments can monitor and evaluate indicators that point to high-risk areas so they’ll know where and how to focus efforts. Such public health surveillance can serve as an early warning system for impending emergencies, document the impact of an intervention, track progress toward public health goals, and clarify health problems to inform public health policies and strategies.
Tags : 
    
SAS
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library