risks

Results 1 - 25 of 971Sort Results By: Published Date | Title | Company Name
Published By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS
Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
Published By: KPMG     Published Date: Jun 06, 2019
Businesses increasingly see cloud as the best route to enhanced agility and digital transformation. But this survey reveals that keeping the lid on cloud costs is far from straightforward. Read this report to discover: • whether businesses are realising the benefits they anticipated from cloud migration • how effective companies are at managing cloud investments • the risks and consequences of getting locked into inefficient architectures.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
As businesses start to experiment with true artificial intelligence, safe delivery of AI demands a new risk and control framework. This report, designed for anyone tasked with the safe delivery of AI, proposes an effective solution. Read the report to find out: • the risks associated with AI and the challenge of managing them • a 17-category Risk & Controls framework for AI • in-depth details for key categories, including security management, business continuity and knowledge management • an essential glossary of AI terms.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Many organisations will be using AI sooner than anyone expects. Prepare now to address the risks from these advanced technologies with this comprehensive framework from our risk experts. Download this practical resource to see AI risk description, control topic and control description, COBIT process and COBIT area for 17 different AI risks.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Develop practical strategies for success and manage the risks associated with supply chain transformation. Read this insight to find out about: • the digital solutions companies are using to reshape their supply chains • the benefits they realise as a result • how to identify opportunities for optimisation in your own supply chain • which practical strategies to deploy for successful digital transformation.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: Nozomi     Published Date: Oct 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: Tricentis     Published Date: Aug 19, 2019
Let’s face it. Businesses don’t want—or need—perfect software. They want to deliver new, businessdifferentiating software as soon as possible. To enable this, we (Development and Testing teams) need fast feedback on whether the latest innovations will work as expected or crash and burn in production. We also need to know if these changes somehow broke the core functionality that the customer base—and thus the business—depends upon. This is where Continuous Testing comes in. Continuous Testing is the process of executing automated tests as part of the software delivery pipeline in order to obtain feedback on the business risks associated with a software release candidate as rapidly as possible.
Tags : 
    
Tricentis
Published By: Rackspace - Google Cloud     Published Date: Jul 26, 2019
In today’s digital world, technologies such as cloud have become commonplace to take digital transformation projects to the next level. But while cloud is critical to business transformation success, Australian IT decision-makers (ITDMs) still feel that the C-suite does not understand the time and complexity of the journey. This paper explores: • Insights on challenges faced by Australian ITDMs when rolling out cloud projects • The role of the ITDM today • Key blockages IT stakeholders encounter when driving digital change, and; • What they need from the business and wider technology ecosystem to navigate the risks associated with starting a cloud project or moving to a full cloud-first model.
Tags : 
    
Rackspace - Google Cloud
Published By: Datastax     Published Date: Sep 27, 2019
Consumers have extraordinarily high expectations of the online user experience, and stakes are at their highest around the holidays. Database infrastructure plays a huge role in holiday success (or failure!). In this eBook, you'll learn ways to evolve your infrastructure to break through five holiday database roadblocks—by reducing stack complexity, improving uptime and elasticity, and smartly managing open source databases.
Tags : 
    
Datastax
Published By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: • Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; • Parsimonious, by using as few factors as possible; • Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; • Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
    
Two Sigma
Published By: BetterUp     Published Date: Aug 14, 2018
Michelle has been with Twilio for nearly four years, supporting “Twilions” — as employees are affectionately known inside the company — through tremendous growth in both revenue and headcount. “We’re looking at creating a great employee experience at Twilio. We want to provide Twilions with the tools, resources, and experiences they need to innovate, scale, and grow.” BetterUp’s whole person approach was a key part of Michelle’s evaluation process. Most leadership development approaches focus on teaching people what to do. But what they miss is an equal focus on how to be. In contrast, BetterUp’s approach addresses the psychological resources that allow leaders to manage themselves so they have the capacity to manage others. This includes the ability to remain resilient, have a growth mindset, maintain a sense of control, and take risks. Evidence shows that these resources need to be in place for sustainable leadership habits to take root.
Tags : 
    
BetterUp
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Jul 13, 2009
Enterprise content is growing at an average rate of 200% per year-and the risks of noncompliance are growing even faster. This paper examines the business and technical difficulties of managing content from disparate systems and presents the most viable alternatives for addressing these challenges.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: Marketo     Published Date: Sep 03, 2019
Having to make big decisions on behalf of your entire business can be intimidating — as marketers, sometimes we’d rather choose to play it safe and see what unfolds naturally, instead of risking the “wrong” move. But what if we told you the safer choice isn't actually safe at all? It's true: indecision and lack of action can actually pose far more of a threat to the wellbeing of your business than you might think. Download this ebook to learn the five biggest risks that come with staying passive, and see why tackling your decisions head-on matters.
Tags : 
    
Marketo
Published By: AWS     Published Date: Oct 09, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over time remains unclear for respondents to a new SANS Institute research study sponsored by BlackBerry Cylance. Opinions varied about the maturity of AI, its benefits and risks, and the baseline requirements for an AI-enabled security solution. Download the report today for the complete survey results and learn: 1) How perceptions of AI vary across industry sectors and organizational roles and responsibilities; 2) How AI technologies compare and contrast with human intelligence; 3) How machine learning is driving advances in the field; 4) What respondents believe to be the greatest risks and benefits of AI; and, 5) The most significant barriers to broader AI adoption.
Tags : 
    
BlackBerry Cylance
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP Business Objects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to provide the conclusions of this cost and benefit analysis.
Tags : 
    
SAP
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP BusinessObjects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to report cost and benefit findings
Tags : 
    
SAP
Published By: ServiceNow     Published Date: Oct 29, 2015
Top Challenges and Risks Associated with Legacy ITSM Systems
Tags : 
    
ServiceNow
Published By: SAP     Published Date: Jul 23, 2018
Forrester Consulting conducted a Total Economic Impact (TEI) study to provide readers with a framework to evaluate the potential financial impact of SAP S/4HANA on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed several customers with experience using SAP S/4HANA. Read the study to learn how Forrester concluded that SAP S/4HANA provides an ROI of 349%.
Tags : 
    
SAP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.