Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management White Papers (View All Report Types)
1 - 25 of 1127 Matches Previous Page  |  Next Page
Security for Virtualization Getting the Balance Right
sponsored by Kaspersky Lab
WHITE PAPER: Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.
Posted: 26 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Kaspersky in Action
sponsored by Kaspersky Lab
WHITE PAPER: In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection?
Posted: 26 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

IDC Server Security: Virtualization and Cloud Changes Everything
sponsored by TrendMicro
WHITE PAPER: Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Complete Data Protection (Advanced) - Data Sheet
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Protecting End of Support Systems
sponsored by TrendMicro
WHITE PAPER: You have options available to address and reduce your risk. What you need is comprehensive security controls that can protect older systems like Windows Server 2003 while you plan and execute a transition that makes sense for your business. Review the risks facing your organization and learn how you can smoothly transition into newer software.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise
sponsored by Kaspersky Lab
WHITE PAPER: A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

The Threats From Within
sponsored by Kaspersky Lab
WHITE PAPER: With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.
Posted: 25 May 2016 | Published: 25 May 2016

Kaspersky Lab

Virtualization Security: Know Your Options
sponsored by Kaspersky Lab
WHITE PAPER: Discover the top three options for delivering security to your virtual servers. Go in-depth on agent-based security, agentless security and light agent security to see which option fits your unique IT architecture.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.
sponsored by Kaspersky Lab
WHITE PAPER: In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Management of Native Encryption for Apple FileVault and Microsoft BitLocker
sponsored by Intel Security
WHITE PAPER: With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack.
Posted: 25 May 2016 | Published: 01 Apr 2016

Intel Security

Application Session Filtering Cookbook
sponsored by Gigamon
WHITE PAPER: This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.
Posted: 24 May 2016 | Published: 31 Dec 2015

Gigamon

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Gemalto
WHITE PAPER: This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.
Posted: 24 May 2016 | Published: 24 May 2016

Gemalto

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

SANS Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by TrendMicro
WHITE PAPER: Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.
Posted: 24 May 2016 | Published: 01 Feb 2016

TrendMicro

Protecting Valuable Data Assets
sponsored by Intel Security
WHITE PAPER: Fortunately, these technical issues don't have to plague your organization. Today, there are a number of integrated information protection solutions that are purpose-built to address security risks and streamline protection controls. Discover how to allow access to qualified entities while not hindering users with complicated access mechanisms.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

Gartner Research Paper Enterprise Firewall
sponsored by Fortinet, Inc.
WHITE PAPER: This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

SB-Secure-Access-for-Retail
sponsored by Fortinet, Inc.
WHITE PAPER: When the same network is used by your shoppers and retail associates alike, it's critical that your network security is capable of detecting advanced threats to protect business assets. Discover how to segment devices and access layers across wired and wireless networks to ensure your network is secured from all access points.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

When Visibility is not Enough: Taking Control of Your Data
sponsored by Intel Security
WHITE PAPER: In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

When App is the Business, the Business is the App Vol. 3
sponsored by IBM MaaS360
WHITE PAPER: IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

When App is the Business, the Business is the App Vol. 2
sponsored by IBM MaaS360
WHITE PAPER: Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

When Business is the App, The App is the Business - Vol 1
sponsored by IBM MaaS360
WHITE PAPER: Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

A Powerful Platform for Cloud Security Analytics
sponsored by Exabeam
WHITE PAPER: Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Accelerate the Investigation Process to Find, and Root out Attackers
sponsored by Exabeam
WHITE PAPER: User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.
Posted: 20 May 2016 | Published: 31 Dec 2014

Exabeam
1 - 25 of 1127 Matches Previous Page    1 2 3 4    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement