Occupational and Environmental Safety White Papers

(View All Report Types)
Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

Fault Tolerance in a Virtual World
sponsored by Stratus Technologies
WHITE PAPER: As data centers adopt virtualization, fault-tolerance becomes more important. Download this white paper to learn about fault tolerance in a virtual world and how it can reduce overall cost of downtime.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Stratus Technologies

Financial Opportunities of Human Resources Outsourcing
sponsored by TriNet
WHITE PAPER: This white paper will explore the financial benefits from contracting with a PEO based on industry best practices.
Posted: 27 Dec 2007 | Published: 11 Apr 2007

All resources sponsored by TriNet

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
sponsored by ArcSight, an HP Company
WHITE PAPER: The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

ArcSight, an HP Company

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Five Things Your IT Resources Should Be Telling You - And Aren't
sponsored by Unisys
WHITE PAPER: This whitepaper describes the types of information IT managers should expect to gain from leading-edge IT resource governance tools.
Posted: 22 Jan 2009 | Published: 22 Jan 2009

Unisys

Five Tips to Reduce Risk From Modern Web Threats
sponsored by Sophos
WHITE PAPER: Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
Posted: 19 Dec 2013 | Published: 30 Sep 2013

Sophos

Five tips to reduce risk from modern web threats
sponsored by Sophos
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos

Five Trends to Track in E-Commerce Fraud
sponsored by ThreatMetrix
WHITE PAPER: This paper outlines five troubling trends in e-commerce fraud, and offers some guidance on how you can mitigate the risk they present to your business.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Fixing the SAP Upgrade Process: Nine Best Practices
sponsored by Panaya, Inc.
WHITE PAPER: This paper takes a new look at the SAP upgrade process in light of emerging best practices and new technologies. This report offers a discussion of the value of both technical and functional upgrades as well as a discussion of some of the best practices to enhance the value of your SAP upgrades while lowering overall cost.
Posted: 10 Nov 2009 | Published: 10 Nov 2009

Panaya, Inc.

Forming an Agile IT Function
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief resource explores the important considerations that CIOs need to keep in mind when taking steps to bring in agility into IT function. Learn how to form a roadmap to IT success by reading on now.
Posted: 06 Nov 2013 | Published: 06 Nov 2013

Hewlett Packard Enterprise

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
sponsored by Oracle Corporation
WHITE PAPER: Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
Posted: 09 Apr 2012 | Published: 31 Jan 2012

Oracle Corporation

ForwardView: Four Areas of Security Vital to Business Health
sponsored by IBM
WHITE PAPER: Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.
Posted: 15 Jun 2010 | Published: 08 Nov 2008

IBM

Four EHR Change Management Mistakes (And How to Avoid Them)
sponsored by HP & Intel®
WHITE PAPER: The question is no longer if your healthcare practice will make the transition to EHR, but when.  Careful planning and effective change management can help keep missteps – and the stress and costs that come with them – to a minimum.  This white paper presents strategies for avoiding common EHR implementation problems.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

From Fear to Fortune: Lessons from Leveraging the Cloud
sponsored by NetSuite
WHITE PAPER: This resource describes the lessons that real-world organizations have learned from their journey to the cloud, and explores how the cloud can cure common business pain points.
Posted: 12 Feb 2014 | Published: 31 Dec 2013

NetSuite

Funding for BI: It’s All About ROI, ROI, ROI
sponsored by IBM
WHITE PAPER: Read this paper for a summary of the 2nd webcast in a series sponsored by IBM that is designed to empower IT and Business Unit managers to develop a strong business case for the return on investment (ROI) of their business intelligence initiatives.
Posted: 10 Aug 2010 | Published: 07 Dec 2009

IBM

Gartner Magic Quadrant: Selecting a vendor
sponsored by IBM
WHITE PAPER: The demand for greater ecommerce capabilities is growing leading CIOs and IT professionals concerned with choosing the perfect vendor. Through this in-depth vendor analysis by Gartner, uncover the top 6 questions you should ask and the strengths and weaknesses of the top 20 e-commerce vendors.
Posted: 17 May 2012 | Published: 03 Nov 2011

IBM

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

GRC Solutions from itelligence: Balance Risk And Opportunity With A Practical Approach to GRC
sponsored by itelligence, Inc.
WHITE PAPER: To keep pace in today's constantly evolving regulatory environment, you need a comprehensive governance, risk, and compliance (GRC) system. This brief white paper highlights how the right GRC strategy can help you standardize business process and increase control over compliance issues.
Posted: 15 May 2013 | Published: 15 May 2013

itelligence, Inc.

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Guide to OCC updates to governance ruling
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Iron Mountain

Hard Hat Area: Myths and Pitfalls of Data Mining
sponsored by SPSS Inc. Worldwide Headquarters
WHITE PAPER: The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

SPSS Inc. Worldwide Headquarters

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Healthcare Information at Risk: Encryption is not a Panacea
sponsored by Intel
WHITE PAPER: This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Intel

Hidden Lynx: Professional Hackers for Hire
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.
Posted: 28 Oct 2013 | Published: 17 Sep 2013

Symantec Corporation