Business of Information Technology  >   Business Management  >   Risk Management  >   Occupational and Environmental Safety  >  

Safety-Improvement Programs

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Practices intended to constantly improve safety within a plant or across a company, including, but not limited to, safety teams, safety awareness programs and communications, safety "days," safety training, and setting of continuous-improvement goals targeting safety metrics, such as OSHA incidents or lost-workday rates.
Safety-Improvement Programs White Papers (View All Report Types)
76 - 100 of 1390 Matches Previous Page  |  Next Page
A Smarter Approach to Retail Order Security
sponsored by Prelert
WHITE PAPER: Many of the platforms that online retailers use to catch security risks require manual human input to alert on issues, allowing unknown or unexpected problems to go undetected until it's too late. This brief resource describes how automated machine learning can help online retailers stay competitive in today's e-commerce landscape.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Prelert

Accelerate the Investigation Process to Find, and Root out Attackers
sponsored by Exabeam
WHITE PAPER: User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.
Posted: 20 May 2016 | Published: 31 Dec 2014

Exabeam

Accenture Technology Vision 2011
sponsored by ComputerWeekly.com
WHITE PAPER: Just as the U.S. space program could not have put a man on the moon using conventional aviation technology, IT leaders and business executives cannot use yesterday’s approaches to realize tomorrow’s objectives.
Posted: 21 Oct 2011 | Published: 25 Feb 2011

ComputerWeekly.com

Achieve a New Level of Security in Healthcare
sponsored by Symantec Corporation
WHITE PAPER: Uncover the key features your security strategy should include, such as protection of patient information from advanced attacks, secure access to data and applications, reduced risk for regulatory compliance, and more.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Achieving HIPAA Compliance
sponsored by Absolute
WHITE PAPER: This white paper shows you how to ensure HIPAA compliance even as healthcare becomes an increasingly mobile environment.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

Absolute

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Adopt a Faster, Simpler, More Flexible Business Management Technology
sponsored by Sage (UK) Limited
WHITE PAPER: As your enterprise grows, greater complexity can make it difficult to keep up with all of your operations, and typical ERP solutions can limit your agility. Discover a faster, simpler, more flexible business management strategy that can empower you to efficiently manage all of your core business processes.
Posted: 21 Oct 2015 | Published: 21 Oct 2015

Sage (UK) Limited

A Prudent Approach to Risk Management
sponsored by RSA
WHITE PAPER: Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.
Posted: 23 Mar 2012 | Published: 01 Feb 2011

RSA

A Shared Environment for IFRS Reporting Can Help Drive Financial Reporting Standardization - and Savings, too
sponsored by Deloitte
WHITE PAPER: This white paper discusses how the global movement toward IFRS offers companies the chance to significantly improve efficiency and reduce financial reporting costs by placing IFRS reporting in a shared environment, or "Center of Excellence" (CoE) and how IFRS CoE can help improve the quality and consistency of financial reporting.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

A-B-C Strategies for Hitachi Data Systems File and Content Solutions
sponsored by Hitachi Data Systems
WHITE PAPER: In this brief white paper, you will gain insight into a single, integrated platform to manage all your structured and unstructured data. Find out how you can move from expensive silos of stored data to a streamlined, cloud-ready solution that simplifies management, reduces risks and supports innovation for the future.
Posted: 09 Oct 2013 | Published: 28 Feb 2013

Hitachi Data Systems

Accelerate App Delivery, Improve App Performance, and Spur Innovation
sponsored by CA Technologies.
WHITE PAPER: Learn about a set of application performance management (APM) and capacity management solutions that together facilitate information sharing between your DevOps teams, in end leading to better app deployments, improved monitoring, lowered number of risks, and reduced repair times.
Posted: 28 Jun 2013 | Published: 31 Aug 2012

CA Technologies.

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Achieving Value in Healthcare Through Efficiency and Effectiveness
sponsored by Dell, Inc.
WHITE PAPER: this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Actionable Enterprise Architecture
sponsored by IBM
WHITE PAPER: This white paper provides an overview of the enterprise architecture concept and highlights how an actionable enterprise architecture approach from IBM can help organizations manage complexity and align IT projects and solutions with business objectives.
Posted: 11 Sep 2009 | Published: 01 Jun 2009

IBM

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
sponsored by IBM
WHITE PAPER: Organizations must implement the right IT GRC controls to meet meet regulatory requirements in areas of specific concern to auditors and reduce operational risk. Learn how IBM provides the capabilities to tackle specific compliance and audit requirements and address issues affecting long-term, ongoing risk management.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

Addressing the Destructive Business Impact of Data Performance Problems
sponsored by Syncsort
WHITE PAPER: This paper details non-disruptive strategies for eliminating performance problems in existing data integration environments.
Posted: 29 Oct 2009 | Published: 28 Oct 2009

Syncsort

Addressing the Insider Threat with NetIQ Operational Change Control Solutions
sponsored by SUSE
WHITE PAPER: Download "Addressing the Insider Threat with NetIQ Operational Change Control Solutions" to get the expert advice you need to build a comprehensive management system that reduces and eliminates the risk of an insider threat.
Posted: 09 Aug 2006 | Published: 29 Mar 2006

SUSE

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Advanced Case Management for Smarter Government
sponsored by IBM
WHITE PAPER: Case management is an area in which many government agencies can benefit by using new tools and approaches. By reading this White Paper, learn how to unify information, processes and people to provide better, faster services and programs.
Posted: 20 Aug 2010 | Published: 20 Aug 2010

IBM

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett Packard Enterprise
76 - 100 of 1390 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement