HIT Consultant Insightful coverage of healthcare innovation
 

business risks

Results 226 - 250 of 266Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2015
Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation with a proactive, business-centric approach to BCM that highlights critical practices.
Tags : 
business continuity management, risk management, bcm plan, business solutions
    
IBM
Published By: IBM     Published Date: Dec 03, 2015
Making changes to your business strategy can often create new risks.
Tags : 
ibm, business continuity management, risk, data
    
IBM
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations
    
HP Service Management
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
View this paper now to explore the top four security risks businesses face when using social networks. In addition, discover various ways to protect against and mitigate these risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems UK
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
CA Technologies automation solutions help organizations increase business productivity by simplifying the management of complex workloads and empowering development teams with self-service tools that accelerate the development and delivery of new and enhanced applications. CA Technologies commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize from automation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of CA on their organizations. To better understand the benefits, costs, and risks associated with CA workload automation (WLA) solutions, Forrester interviewed an existing customer with years of experience using CA. The organization that Forrester interviewed manufactures consumer electronics that it sells through retailers around the globe. Download this whitepaper to find out more.
Tags : 
    
CA Technologies_Business_Automation
Published By: Sage EMEA     Published Date: Jan 29, 2019
SagecommissionedForresterConsultingtoconducta TotalEconomicImpact™(TEI)studytoexaminethe potentialreturnoninvestment(ROI)organizationsmay realizebydeployingits Enterprise Management solutionas part of Sage Business Cloud.Thepurpose ofthisstudyistoprovidereaders withaframework to evaluatethepotentialfinancialimpactof Enterprise Managementwithintheir organizations. Tobetter understandthebenefits,costs,andrisks associatedwithaninvestmentinEnterprise Management,Forrester conducted in-depth interviews withtwoEnterprise Managementcustomers. For a brief description of each customer, see the Analysis section. According toSage,Enterprise Managementis an integratedand globalenterprise business management solution for purchasing, manufacturing, inventory, sales, customer service,and financial management. Formoredetails ontheEnterprise Management solution,seeAppendix A. For this TEI study, Forrester has created a compositeOrganizationto illustrate the quantifiable benefits and costs of investing i
Tags : 
    
Sage EMEA
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Dropbox for Business     Published Date: Jun 09, 2014
“Security” is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure.1 But the truth is, cloud solutions can offer companies real, tangible security advantages. Before you assume that on-site is the only way to keep data safe, it’s worth taking a comprehensive approach to evaluating risks. Doing so can lead to big benefits.
Tags : 
dropbox, cloud, security, business, risk, secure
    
Dropbox for Business
Published By: IBM     Published Date: Aug 21, 2008
Natural and manmade disasters have costly, far-reaching impacts on businesses. And organizations of all types are making business continuity plans that protect their data, networks, core business applications and facilities. But it’s important to build resiliency into your business operations as well your human capital. This Web seminar on Workplace Recovery will take you through the risks related to human capital resiliency and provide a framework for addressing them.
Tags : 
ibm, ibm mi, ibm grm, disaster recovery, recovery, business continuity
    
IBM
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability
    
Centrify Corporation
Published By: Symantec     Published Date: Nov 19, 2014
The top ten tips on how to secure your business against cyber risk and threats.
Tags : 
tips for cyber resilience
    
Symantec
Published By: Workday UK     Published Date: Jan 31, 2019
Data privacy and cyber security are now a larger risk and priority for businesses than ever before. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic now.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday UK
Published By: Mimecast     Published Date: Feb 05, 2010
Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
    
Hewlett Packard Enterprise
Published By: Aconex     Published Date: Jun 18, 2008
In the construction industry, as in business generally, risk management involves identifying risks, assessing them and then developing strategies to manage them. Organizations that manage risk well enjoy financial savings, greater productivity and service quality, improved success rates of new projects and better decision making. It is clear that, in today's complex business environment, risk factors are wide reaching, and are intrinsically linked to achieving organizational objectives.
Tags : 
risk management, collaboration, web collaboration, web-based collaboration, aconex
    
Aconex
Published By: Great Bay Software     Published Date: Apr 12, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Microsoft     Published Date: Jun 19, 2017
Gartner reports that 75% to 80% of organizations are using some form of agile project management process. Although agile project management has been around for many years, the way we adapt it has changed significantly, especially as project portfolio management (PPM) practices have evolved. In today’s businesses, technology plays a crucial role in our success, but technology can also make things more uncertain. This uncertainty has given us the motive to be more flexible and requires a “think on your feet” mentality. For this reason, we've seen a big spike in Agile PPM over the last few years. So how do we continue to deliver stability and efficiency, the result of traditional style PPM, while also giving in to necessary risks that lead to innovation and competitive edge? It’s simple: accept the value in each method, avoid the inevitable pains that may develop with segregation, and opt for a unified agile and traditional PPM model.
Tags : 
    
Microsoft
Published By: Workday     Published Date: Feb 01, 2019
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday     Published Date: Feb 01, 2019
Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday APAC     Published Date: Dec 18, 2018
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
    
Workday APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.