HIT Consultant Insightful coverage of healthcare innovation
 

business risks

Results 201 - 225 of 265Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 06, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, it dependence, managing it risk, ibm solutions
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Just as business intelligence helps enterprises make decisions that maximize opportunities and minimize business risks, security intelligence enables them to better detect threats, identify security risks and areas of noncompliance, and set priorities for remediation. One of the most compelling arguments for security intelligence is operational efficiency, or better use of people, time and infrastructure. This white paper discusses how security intelligence is an essential ingredient to comprehensive and cost-effective information security.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud siem, security intelligence event management
    
IBM
Published By: IBM     Published Date: Oct 18, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I be most concerned with? The point is, not all data deserves equal protection. A more effective approach is to understand: • Which data is most critical (also known as “crown jewels”)? • Where does that data reside? • How is it exposed to security risks? • What potential impact would a security breach to this data have on your organization? • What are the appropriate steps to take based on the data’s criticality?
Tags : 
ibm, data, it security, data analytics
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
The challenges faced by midsize businesses remain daunting. An uncertain economic outlook, slow market growth and cost pressures continue to affect most industries. Yet, in most geographies, IT spending by midsize businesses is increasing. This report deals with this cost/benefit equation. Specifically, it compares the IBM i 7.1 operating system deployed on Power Systems with two alternatives: use of Microsoft Windows Server 2008 and SQL Server 2008, and use of x86 Linux with Oracle Database 11g, both deployed on Intel-based servers.
Tags : 
ibm, ibm i 7.1, power systems, it solutions, it costs, risk management, software solutions
    
IBM
Published By: Microsoft Office 365     Published Date: Apr 05, 2016
Download the ebook, “5 Biggest CIO Communications Problems, Solved”, to learn how Office 365 addresses these common pain points: Change disrupts business as usual It costs time and money to implement new solutions Incompatibility can wreak havoc The risks seem high while the benefits are unclear I need a solution that addresses my teams' unique needs
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ study to examine the potential return on investment (ROI) businesses can receive through the deployment of Office 365. To better understand the benefits, costs, and risks associated with an Office 365 implementation, we interviewed four existing customers and surveyed 72 midsized organizations (with 150 to 2,000 users) about the use of Microsoft business products the SaaS platform, including Office Professional Plus, Exchange, Skype for Business (formerly Lync), SharePoint, Yammer, and OneDrive. Our research found that a sample composite organization (which switched from an on-premises 2010 version solution to Office 365) had total present value benefits of $3.4 million versus total present value costs of $1.3 million, resulting in a net present value (NPV) of $2.1 million.
Tags : 
    
Microsoft Office 365
Published By: Cisco     Published Date: Feb 16, 2016
From collaboration to communication to data access, the web is a mission-critical business tool. Enterprises rely on the web not only to innovate and compete but also to conduct business. But the web poses significant security risks that are easily encountered by users, yet not so easy to detect.
Tags : 
cisco, web threat, data security, information security, data access
    
Cisco
Published By: Microsoft Office 365     Published Date: Apr 14, 2016
Download the ebook, “5 Biggest CIO Communications Problems, Solved”, to learn how Office 365 addresses these common pain points: Change disrupts business as usual It costs time and money to implement new solutions Incompatibility can wreak havoc The risks seem high while the benefits are unclear I need a solution that addresses my teams' unique needs
Tags : 
    
Microsoft Office 365
Published By: IBM     Published Date: Jan 09, 2015
Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation with a proactive, business-centric approach to BCM that highlights critical practices.
Tags : 
business continuity management, risk management, bcm plan, business solutions
    
IBM
Published By: IBM     Published Date: Apr 06, 2015
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
big data, analytics, unstructured content, enterprise information, ibm
    
IBM
Published By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team
    
Symantec
Published By: Cisco     Published Date: Jan 05, 2015
Midsize organizations strive for success. Being successful means consistently making smart decisions— including smart technology purchases. Technology should enable a midsize organization to meet the needs of its employees and customers today and also allow the organization to make simple but rewarding changes in the future. Technology must support changes that occur in a business without increasing the risks associated with providing excellent customer service, engaging with suppliers, and conducting many common business processes.
Tags : 
cloud-based, collaboration, hosted, flexibility, productivity, deployment, public, private, communication, technology solutions
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Midmarket enterprises strive for success in a highly competitive landscape. Being a successful leader means encouraging employees to collaborate and work more efficiently to increase the success of the enterprise. Technology solutions can empower employees for success at work, home, and when mobile, but technology must also be able to support changes that occur in a business without increasing the risks associated with providing excellent customer service, fostering innovation, and engaging with an enterprise’s stakeholders.
Tags : 
cloud-based, collaboration, hosted, flexibility, productivity, deployment, public, private, communication, technology solutions
    
Cisco
Published By: HP     Published Date: Aug 26, 2014
HP Just Right IT solutions address the networking needs of the SMB customer, no matter size or maturity level. HP OfficeConnect small business solutions provide plug-and-play wired and wireless switches with advanced features that support the needs of your growing business. HP Networking mid-market solutions, based on the HP FlexNetwork architecture, support wired and wireless networking, cloud computing, and rich-media traffic. HP also offers comprehensive network Support Services to help manage your network, mitigate risks and downtime, and increase the business value of your technology. Find out more.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, plug, play, customer, traffic, rich-media, computing
    
HP
Published By: HP     Published Date: Aug 26, 2014
UC combines voice, email, instant messaging (IM), audio conferencing, and video conferencing with presence awareness to immediately locate and contact individuals. HP's collaborative and modular approach to UC increases business productivity, reduces risks, and reduces telecommunications costs, helping you reach people more effectively, and helping your customers and partners reach you. Learn more
Tags : 
unified, instant messaging, email, video, communication, modular, audio, conferencing, data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable
    
HP
Published By: HP     Published Date: Aug 26, 2014
HP Simply StoreIT takes the stress out of storage. HP and our network of over 200,000 channel partners worldwide can help you choose the right solutions to fit your biggest business challenges. We can help you overcome obstacles including too little time for managing IT, budgets for upgrading infrastructure, and too many business risks and threats. Now you can take charge of virtualization, storage for business solutions such as Exchange and SQL Server, growing file shares, and data protection for business continuity. Improve your operational efficiency, reduce your risks, and lower storage costs. See how.
Tags : 
storage, budgets, server, virtualization, file, data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork
    
HP
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: Oracle Corp.     Published Date: Jan 16, 2013
As business operations become more complex, the demand for change in IT increases, along with the associated risks that must be mitigated.
Tags : 
oracle, 11g, database, oltp, oracle exadata
    
Oracle Corp.
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 08, 2014
"SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services. The risks of hiccups and problems increases with the number of certificates, including lost sales when customers see security warnings about expired certificates on your site, damage to your brand and consumer trust because of problems with certificates and more. With these risks in mind, this guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle."
Tags : 
    
Symantec Corporation
Published By: IBM     Published Date: Aug 21, 2008
Today’s increasingly complex environments are a challenge to manage. This white paper will show you how IBM Service Management solutions from Tivoli can help you better understand your IT and operation environments and manage your business more efficiently—all while controlling costs and mitigating compliance risks. You’ll also discover how IBM Maximo Enterprise Asset Management solutions provide a single software platform for managing all IT and operations assets across your enterprise.
Tags : 
ibm, ibm mi, ibm grm, service management, tivoli, business management, maximo, it management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.