Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 
Definition continues below.
Risk ManagementReports
76 - 100 of 1410 Matches Previous Page  | Next Page
Data Breach Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: With rapid adoption of Microsoft Lync, new forms of data such as IM, chat, voice, and video are proliferating. Organizations need to deploy industrial strength methods to prevent mounting security risks. Download THIS WHITEPAPER to find out how!
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Strengthening Security, Compliance, and Control in Microsoft® Office 365®
sponsored by Actiance
WHITE PAPER: There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based or on-premises tools to enhance Office 365's native capabilities.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

Expose Hidden Threats with new SSL Decryption Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this informative white paper, discover how crucial new SSL decryption and inspection solutions can help organizations manage threats and sensitive data on their network.
Posted: 22 Sep 2014 | Published: 30 Nov 2013

Blue Coat Systems

Take back control of enterprise data
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how enterprise content management can help you lower cost and risk and drive strategic insight and productivity.
Posted: 21 Sep 2014 | Published: 17 Mar 2014

Hewlett-Packard Company

Why eDiscovery Should be a Top Priority for Your Organization
sponsored by Hewlett-Packard Company
WHITE PAPER: E-discovery rules and requirements continue to evolve and are placing additional demands on IT pros. Find out why in this report by Osterman Research.
Posted: 21 Sep 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

How Information Governance Helps You Meet Corporate Responsibilities
sponsored by Hewlett-Packard Company
WHITE PAPER: What is information governance? How can you make it work for you? Find out in this report by Kahn Consulting, and learn how to address its challenges.
Posted: 21 Sep 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Streamline eDiscovery
sponsored by Hewlett-Packard Company
BROCHURE: Discover how HP eDiscovery can perform the complete range of eDiscovery steps, from collection through production.
Posted: 21 Sep 2014 | Published: 05 Dec 2013

Hewlett-Packard Company

Gain control over all enterprise content
sponsored by Hewlett-Packard Company
BROCHURE: HP ControlPoint and HP IDOL allow you to identify and connect information siloes and apply policies to data. Learn how.
Posted: 21 Sep 2014 | Published: 09 Oct 2013

Hewlett-Packard Company

Intelligent, automated employee communications monitoring
sponsored by Hewlett-Packard Company
BROCHURE: Learn why some of the world's largest companies rely on HP Supervisor to monitor employees' electronic communications.
Posted: 20 Sep 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Next Generation Firewalls: Here’s What You Need To Know
sponsored by HP and Intel
WHITE PAPER: This expert eGuide breaks down next-generation firewalls, their new features, and the new IT rules that come along with them.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

HP and Intel

Information Governance Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: The IG risks of deploying Microsoft Lync are similar to those of other electronic communications such as email: malware, data leakage, inappropriate employee use, regulatory noncompliance, and skyrocketing legal costs.Download THIS WHITEPAPER to find out more!
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Actiance

Eliminate Security Blindspots with New Encrypted Traffic Management Solutions
sponsored by Blue Coat Systems
RESOURCE: In this interactive guide, discover new encrypted traffic management solutions that can expose security blind spots without compromising privacy or regulatory compliance.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Blue Coat Systems

Why Next-Generation Firewalls Are Critical To Your Organization’s Network Security
sponsored by Icomm Technologies
WHITE PAPER: This in-depth whitepaper explores the next generation of firewalls, which can provide more effective advanced threat protection, enhanced application intelligence and control, and higher performance.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

Best Practices Guide for IT Governance & Compliance
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, discover three critical steps for maintaining compliance with external regulations and internal security policies.
Posted: 18 Sep 2014 | Published: 31 Dec 2012

Dell, Inc.

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

The Balancing Act of Threat Intelligence and Risk
sponsored by CDW Corporation
WHITE PAPER: In this expert resource, get an inside at how risk management and threat intelligence affect global risk assessment, and how security officers can benefit from them.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

Does Your SIEM Integrate Threat Data?
sponsored by CDW Corporation
WHITE PAPER: This expert eGuide explores how new technologies are integrating threat intelligence into SIEM solutions and enabling organizations to better prioritize security controls.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

Threat-Aware Identity and Access Management for Mobile, Cloud, and Enterprise
sponsored by IBM
WHITE PAPER: This informative white paper presents new identity and access management (IAM) solutions with integrated threat prevention and analysis, increased granularity, and simplified user interfaces and dashboards.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

IBM

Anatomy of a Cyber-Attack: How Cyber Criminals Operate, and How You Can Stop Them
sponsored by Icomm Technologies
WHITE PAPER: In this informative resource, get an inside look the basic steps of a cyber-attack, from reconnaissance to intrusion to malware insertion, as well as new integrated security solutions that can help prevent these malicious activities from disrupting your business.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

Icomm Technologies

Get Unprecedented Visibility, Control, and Policy Creation Options with Encrypted Traffic Management
sponsored by Blue Coat Systems
RESOURCE: This concise info graphic presents a new encrypted traffic management solution that provides organizations with unprecedented visibility, control, and policy creation options.
Posted: 16 Sep 2014 | Published: 09 Dec 2013

Blue Coat Systems

2014 Gartner SIEM Market Report: Which Vendors Deliver?
sponsored by IBM
WHITE PAPER: In this Gartner report, get the facts on today's SIEM vendor landscape with in-depth evaluations and breakdowns of the top players and products in the industry.
Posted: 16 Sep 2014 | Published: 25 Jun 2014

IBM

How Data Breach Investigation Solutions Can Help You Prepare for Future Malware Attacks
sponsored by IBM
WHITE PAPER: This informative white paper introduces a fast, simple, and comprehensive breach investigation solution designed to help organizations defend against advanced persistent and internal threats, including fraud and abuse.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

IBM

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
76 - 100 of 1410 Matches Previous Page    2 3 4 5 6 7    Next Page
 
RISK MANAGEMENT DEFINITION (continued): …  factors have fueled a heightened interest by organizations in ERM. Industry and government regulatory bodies, as well as investors, have begun to scrutinize companies' risk-management policies and procedures. In an increasing number of industries, boards of directors are required to review and report on the adequacy of risk-management processes in the organizations they administer.Since they thrive on the business of risk, financial institutions aregood examples of companies that can benefit from effective ERM. Their success depends on striking a balance between enhancing profits and managing … 
Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement