Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk Management Reports
226 - 250 of 1721 Matches Previous Page  |  Next Page
Barracuda NextGen Firewall F Boosts Wireless Network Security for5,000 Users During the 2015 European Youth Olympics
sponsored by Barracuda Networks
RESOURCE: Zurab Tuskia, head of IT infrastructure of the Festival, chose Wi-Fi secured by a next-generation firewall for its ease of deployment and cost effectiveness over other, more complex solutions. Learn more about their decision that provided them live traffic monitoring and rejection capabilities unwanted of p2p traffic.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

8 Key Functions to Prevent Data Loss with User Behavior
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam

Overcoming 4 Key Challenges of Data Privacy
sponsored by Iron Mountain
WHITE PAPER: Data privacy must be protected on a continuous basis far beyond the requirements of passing compliance audits. Learn the 4 key challenges of data privacy and how to overcome them.
Posted: 13 May 2016 | Published: 01 Apr 2016

Iron Mountain

5-Step Guide For GDPR Compliance
sponsored by Druva Software
WHITE PAPER: This white paper shows you a 5-point plan to prepare your organization to meet the new needs of data protection regulations. Learn how to track the creation of new files on laptops and other mobile devices and automatically ensure that files containing customer data and PII are protected.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

IT Guide: Protecting Corporate Data Beyond the Firewall
sponsored by Druva Software
WHITE PAPER: 24/7 data monitoring can ensure your important information stays on devices and on networks that you deem safe. Learn how to be proactive in your compliance requirements and stay on top of how your data is handled.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

Everything You Need to Know About Crypto Management
sponsored by Gemalto
WHITE PAPER: The best way to secure sensitive information is by placing safeguards around the data itself through encryption. Learn how to better manage your encrypted data to enable greater security enforcement and overall better efficiency.
Posted: 13 May 2016 | Published: 01 Apr 2016

Gemalto

Eissmann Group Automotive Evaluates NextGen Firewall F-Series
sponsored by Barracuda Networks
WHITE PAPER: Learn what went into Eissmann Group Automotive's decision to replace their firewall when their existing routers were reaching their performance limits.
Posted: 12 May 2016 | Published: 01 Apr 2016

Barracuda Networks

IT Security Vendor Analysis by Bizety
sponsored by Distil Networks
WHITE PAPER: This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

13 Questions You Must Ask Your Bot Mitigation Vendor
sponsored by Distil Networks
WHITE PAPER: Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

The 2016 Bad Bot Landscape Report
sponsored by Distil Networks
RESOURCE: This report gives you stats and graphs about recent bot traffic and how bots are crippling the cyber landscape. You'll learn how bots are created and the specific, sophisticated attacks than can use to disable your organization.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

It's Time to Re-evaluate Your Email Encryption Solution
sponsored by ZixCorp
VIDEO: Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.
Posted: 12 May 2016 | Premiered: 18 Dec 2013

ZixCorp

Industry Expert FAQ: How Can IT Help Mitigate Security Risks?
sponsored by Juniper Networks, Inc.
ANALYST BRIEF: This white paper shares insights from industry expert Jennifer Blatnik as she discusses how IT best mitigates security risks. Learn what she believes are the top network security threats today and how to best address cloud security issues.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

TechTarget's Top 6 Security Measures for the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Customer Spotlight | blinkbox
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid cloud security for their platform. Watch now to see how they remediated their security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

IBM QRadar - Sense and Detect Modern Threats with the Most Sophisticated Security Analytics Platform
sponsored by IBM
WHITE PAPER: This white paper shows you how to "sense" chains of malicious activities and rapidly deploy security tools across your entire network including cloud-based resources. Access now to greatly improve your remediation efforts and minimize potential damage to your organization.
Posted: 11 May 2016 | Published: 01 Apr 2016

IBM

Whiteboard: Barracuda Web Application Firewall
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about common types of web application attacks and what you can do to save your website. Watch now to discover how firewalls can best protect your site against targeted and automated attacks. Protect the integrity of your data and safeguard the reputation of your business.
Posted: 10 May 2016 | Premiered: 30 Jun 2015

Barracuda Networks

4 Strategies for Keeping Critical Networks Secure
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn four major criteria for selecting the right long term security partner. Access now to find a security provider who can satisfy these major areas of concern and other areas of need for your organization.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

3 Major Challenges to Securing Your Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: This report addresses the top 3 major security challenges as your organization moves into the cloud. Gain an overview of strategies for protecting your data and network.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Enhancing the security and performance of your cloud-based applications
sponsored by Verizon
VIDEO: This video shows you how you can securely connect to a variety of leading cloud providers through advanced network services, giving you a reliable end-to-end experience for all your cloud-based applications. Watch now to discover secure, on-demand connectivity to drive growth, improve business performance and gain a competitive advantage.
Posted: 10 May 2016 | Premiered: 25 Feb 2015

Verizon

Computer Weekly – 10 May 2016: Graph databases are making connections
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the recent Panama Papers scandal relied on graph databases to uncover secrets from huge volumes of data – we look at the business benefits of the technology. Most organisations are failing to take basic IT security measures – we examine why. And we analyse the latest flash storage innovations. Read the issue now.
Posted: 10 May 2016 | Published: 10 May 2016

ComputerWeekly.com

Move to the cloud with confidence.
sponsored by Verizon
WHITE PAPER: This white paper shows you how to safely connect with a variety of cloud providers to alleviate possible cloud apprehensions. Access now to learn more about how to easily, reliably and securely move to the cloud.
Posted: 10 May 2016 | Published: 31 Dec 2014

Verizon

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

The Risks of Email and the Rewards of Innovative Encryption
sponsored by ZixCorp
WHITE PAPER: This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.
Posted: 10 May 2016 | Published: 01 Apr 2016

ZixCorp
226 - 250 of 1721 Matches Previous Page    8 9 10 11 12 13    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement