Risk Management Research
-
Financial Opportunities of Human Resources Outsourcing
Sponsored by: TriNetThis white paper will explore the financial benefits from contracting with a PEO based on industry best practices.
-
An Executive Approach to Strategic HR
Sponsored by: TriNetThis article discusses the key areas of HR that provide strategic impact and therefore merit an executive's time and attention.
-
Beyond Disaster Recovery: Becoming a Resilient Business Organization
Sponsored by: IBM Software GroupDiscover how to combine several risk management strategies into a single integrated one, making your infrastructure able to respond to the threat of disaster.
-
Database Worst Practices: The Top 5 Mistakes Developers Make and How to Avoid Them
Sponsored by: EnterpriseDB CorporationAttend this Webcast to learn the top five mistakes that database developers make and how to avoid them. Listen and learn from real world experiences to ensure a successful installation.
-
Methods, Motivations, and Mitigation of Insider Threats
Sponsored by: VeriSign, IncThis white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
-
Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance
Sponsored by: IBMThis paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor...
-
Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
Sponsored by: SonicWALLSSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
-
10 Steps to Managing Risk and Regulatory Compliance in Blogs and Wikis
Sponsored by: TechrigyRisks related to collaboration tools like blogs and wikis can create legal liability and regulatory problems. Learn how to gain competitive advantage from these community-building tools while ensuring the content in them is appropriate and secure.
-
The Business Case for Data Access Governance
Sponsored by: VaronisThis white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
-
Fault Tolerance in a Virtual World
Sponsored by: Stratus TechnologiesAs data centers adopt virtualization, fault-tolerance becomes more important. Download this white paper to learn about fault tolerance in a virtual world and how it can reduce overall cost of downtime.
-
Extend Business Reach with a Robust Security Infrastructure
Sponsored by: IBM Software GroupThis white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.
-
The High Stakes of Security: Protecting Your Brand
Sponsored by: IBM Software GroupThis white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization...
-
CRO Survey: Risk, Regulation and Return
Sponsored by: IBM Line of BusinessTo better understand the perspectives and concerns of today's CROs, the IBM Institute for Business Value interviewed banking risk management executives in depth and cosponsored a wider, cross-industry survey conducted by the Economist Intelligence Unit.
-
The Data Governance Maturity Model
Sponsored by: DataFlux CorporationThe success of a business is increasingly tied to the quality of their information. Through the Data Governance Maturity Model, organizations can identify precisely how they can create an environment that can deliver and sustain high-quality information.
-
Video: Move Beyond Efficiency to Deliver Value with IBM Service Management
Sponsored by: IBM Software GroupIBM Service Management can help IT organizations deliver service excellence, through a structured approach that can enable better governance and help manage risk, delivering business value. Watch this video to learn how you can deliver quality ...
-
B2B Collaboration: How On-Demand Platforms Accelerate Value and Impact TCO
Sponsored by: E2openThis report provides a value framework that can help companies validate if on-demand solutions are right for their B2B collaboration needs.
-
Online Demo - Vulnerability Management & Policy Compliance Overview
Sponsored by: Qualys, Inc.Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
-
SOA: A Perspective on Implementation Risks
Sponsored by: Infosys Technologies LimitedIf potential risks to a SOA implementation are not identified during the planning process, they can be difficult to mitigate during the implementation. Read this paper to learn how an awareness of these risks can help ensure a successful adoption.
-
The Anatomy of an Archiving Project
Sponsored by: Princeton SoftechCorporations worldwide rely on archiving as a best practice to control costs, improve service levels and automate data retention across multiple business areas.
-
Anatomy of an Archiving Project
Sponsored by: Princeton SoftechEffective enterprise data management strategies that include archiving provide a full-lifecycle approach for managing enterprise application data. Learn how archiving data enables you to improve performance, control costs and minimize risk.
-
Driving Information-led Business Innovation with IBM Information Server
Sponsored by: IBM Software GroupLearn about a software platform that helps companies derive more value from the complex, heterogeneous information spread across systems. Learn how to integrate disparate data and deliver trusted information wherever and whenever.
-
Support Compliance and Enhance Confidentiality with Secure Email Delivery
Sponsored by: Captaris, Inc.With the heightened concern today about protecting information privacy, preventing fraud and meeting tightened regulatory compliance guidelines, having secure and confirmed delivery options for sensitive information is vital to conducting busin...
-
What's New in Group Policy Administrator 5.0
Sponsored by: SUSEManaging Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.
-
Service Management with AppManager
Sponsored by: SUSESign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
-
VigilEnt Policy Center 4.2 Trial
Sponsored by: SUSEVigilEnt Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.