HIT Consultant Insightful coverage of healthcare innovation
 

business risks

Results 226 - 250 of 266Sort Results By: Published Date | Title | Company Name
Published By: Oracle Corp.     Published Date: Jan 16, 2013
As business operations become more complex, the demand for change in IT increases, along with the associated risks that must be mitigated.
Tags : 
oracle, 11g, database, oltp, oracle exadata
    
Oracle Corp.
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : 
ibm, technology, predictive operational analytics, spss
    
IBM
Published By: IBM     Published Date: Jul 12, 2012
Today's technology landscape is transforming the concepts of business IT prevalent only just a few short years ago. With this transformation, however, has also come an equivalent transformation of risks.
Tags : 
enterprise security, ema, ibm, security, intelligence
    
IBM
Published By: 5000fish, Inc     Published Date: May 13, 2012
5000fish, Inc., a cutting-edge provider of Business Intelligence software, aims to guide organizations on how they can manage their spreadsheet usage by presenting the benefits and risks of managing their business analytics using only spreadsheets.
Tags : 
    
5000fish, Inc
Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
    
Symantec.cloud
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems UK
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: VMware     Published Date: Aug 23, 2011
This paper analyzes the benefits and drawbacks of outsourcing cloud services, examines the business benefits and risks, and provides the steps one should take for a successful implementation.
Tags : 
vmware, market pulse report, global cloud adoption trends, cloud computing, transformation, enterprise hybrid cloud, business agility, cios, business value, business application, virtualization, data center
    
VMware
Published By: VMware     Published Date: Aug 23, 2011
This paper analyzes the benefits and drawbacks of outsourcing cloud services, examines the business benefits and risks, and provides the steps you should take for a successful implementation.
Tags : 
vmware, cloud computing, outsourcing cloud services, gartner, saas applications, data center outsourcing, hosting, infrastructure utility, cloud service implementation
    
VMware
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
View this paper now to explore the top four security risks businesses face when using social networks. In addition, discover various ways to protect against and mitigate these risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: TriNet     Published Date: Jun 13, 2011
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : 
trinet, entrepreneur, peo, professional employer organization, smb, human resources, co-employment, talent market, due diligence, company risk, asset management, benefits
    
TriNet
Published By: TriNet     Published Date: Jun 13, 2011
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : 
trinet, entrepreneur, peo, professional employer organization, smb, human resources, co-employment, talent market, due diligence, company risk, asset management, benefits
    
TriNet
Published By: TriNet     Published Date: Jun 13, 2011
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : 
trinet, entrepreneur, peo, professional employer organization, smb, human resources, co-employment, talent market, due diligence, company risk, asset management, benefits
    
TriNet
Published By: SAP     Published Date: Apr 14, 2011
It's a near-daily occurrence: Companies of all sizes in all geographies are going out of business, which has a ripple effect both upstream and downstream. Learn in this AMR Research article, what you can do to monitor and minimize supplier risks.
Tags : 
suppliers, due diligence, continental vdo, honeywell aerospace, mitigation planning, visibility, opportunity management, supply chain risk management
    
SAP
Published By: PC Mall     Published Date: Mar 21, 2011
For some companies, even a few hours of downtime can become a business disaster. IT risks must be considered as serious as any other significant business risk. When was the last time you assessed your business risks? Download this HP white paper to learn how to reduce the financial impact and maintain acceptable levels of productivity during an unplanned disaster.
Tags : 
disaster recovery, it risks, business continuity, outage, risk management
    
PC Mall
Published By: Symantec.cloud     Published Date: Aug 10, 2010
With 75% of business intellectual property contained in email, efficiently managing this data can pose a major challenge. Learn how hosted email archiving reduces legal risks while improving employee productivity.
Tags : 
messagelabs, symantec hosted services, email archiving, employee productivity, compliance
    
Symantec.cloud
Published By: Pillar Data Systems     Published Date: Apr 20, 2010
In this brief 23-minute on-demand Webinar, opinion leaders from Pillar Data Systems and industry experts from featured analyst firm, Gartner, Inc., break down the challenges that today's organizations face and help them to select a flexible storage platform that will adapt to changing business and application requirements while minimizing risks and reducing management complexity.
Tags : 
pillar data systems, modern storage infrastructure, it infrastructure, productivity, tco, green it, data
    
Pillar Data Systems
Published By: RackSpace Hosting     Published Date: Apr 16, 2010
The business demands a solution which maximizes return while investing enough to mitigate perceived business risks, which requires technologies that align with the business's goals and objectives.
Tags : 
rackspace hosting, e-commerce strategy, risk mitigation
    
RackSpace Hosting
Published By: Mimecast     Published Date: Feb 05, 2010
Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql
    
Marathon Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.