Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk ManagementReports
 
Attensity: Insurance Case Study
sponsored by Attensity
CASE STUDY: The following case study reveal the solution that a multi-billion dollar financial services company used to make faster, more accurate claim decisions, assign specialists to high-risk claims earlier in the process cycle, decrease the impact of insurance fraud, and more.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Attensity

Managing the Software Supply Chain
sponsored by IBM
WHITE PAPER: Find out how your organization should address the risk in managing the software supply chain.
Posted: 07 Aug 2014 | Published: 30 Sep 2013

IBM

Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IFS

Next Generation Architecture for Big Data & Analytics
sponsored by IBM
DATA SHEET: Learn how utilizing big data and analytics can help you outperform the competition, manage risk more effectively and create IT agility – all while significantly reducing maintenance and storage costs.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

IBM

A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Symantec Corporation

Ponemon Study: The Real Cost of Data Breaches in 2014
sponsored by IBM
WHITE PAPER: In this Ponemon study, get the facts on whether your organization might be the target of a devastating cyber-attack, and on the proven methods for best protecting and preserving your business.
Posted: 22 Aug 2014 | Published: 31 May 2014

IBM

The New Breed of DDoS Attacks: An Executive Brief
sponsored by Juniper Networks, Inc.
WHITE PAPER: This informative resource breaks down the new breed of DDoS attacks, and provides strategies for keeping your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: This resource discusses compliance issues and security gaps, explains how these can affect your organization, and how implementing a positive security solution can close the gaps.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Bit9 + Carbon Black

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Cybercriminals Exploit New Weaknesses in Retailers’ Networks
sponsored by FireEye
WHITE PAPER: In this informative white paper, discover how you can protect your retail business and your customers by implementing smart security strategies, including increased endpoint security and privileged account management.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement