risk

Results 1 - 25 of 2763Sort Results By: Published Date | Title | Company Name
By: Zircadian Ltd     Published Date: Jan 10, 2011
Using an e-rostering system can save trusts significant sums each year, while ensuring patient services are maintained or even improved. Recent changes in working practices for junior doctors means that trusts are often forced to use expensive locums to fill gaps on rosters. As well as being a costly option, anecdotal evidence has shown that external locums are often not as efficient or knowledgeable of local working practices as internal locums and therefore could be putting patient safety at risk.
Tags : 
it
    
Zircadian Ltd
By: Imprivata     Published Date: Jul 02, 2010
With the proliferation of electronic patient information, hospital administrators, compliance officers,privacy officers and information security officers are required to enforce patient privacy. Motivated by patient-citizen damages from increased healthcare privacy breaches, law-makers across the United States, Canada, and Europe have enacted new regulation protecting patient privacy and penalizing those involved. Snooping, identity theft and general inappropriate access of medical records are now explicitly prohibited. Additionally, a patient's right to know who has accessed their records has been expanded,requiring hospitals and their business associates to account and disclose for personal health information breaches. Beyond putting patients at risk, personal health information breaches are increasingly putting healthcare organizations at a significant risk of financial, and reputational harm.
Tags : 
privacy monitoring, it
    
Imprivata
By: Proofpoint Limited     Published Date: Apr 27, 2011
More than ever before, enterprises are under pressure to protect private data. Part of the pressure comes from the chilling examples of companies who failed to protect private data and then paid a high price in regulatory fines, disaffected customers, lost business, and damaged brands. Part of the pressure comes from knowing just how frequently data breaches occur. In a recent survey of email decision makers at large U.S. companies, 34% reported that their business had been affected by the leak of sensitive or embarrassing information in the past year, 33% had been affected by the improper exposure or theft of customer information, and 28% had been affected by the improper exposure or theft of intellectual property. Thefts are common. Leaks are common. Enterprises, even cautious ones, are plainly at risk. Proofpoint Encryption can help keep private data in email secure.
Tags : 
encryption, security, private data, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
Proofpoint Limited
By: Dynamic Change limited     Published Date: Sep 02, 2010
The Trust Board's main focus is strategic. Board Members must understand the business objectives and be able to identify the principal risks that may threaten the achievement of these objectives.
Tags : 
board assurance, policy
    
Dynamic Change limited
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
    
Hewlett Packard Enterprise
By: Sage EMEA     Published Date: Jan 29, 2019
SagecommissionedForresterConsultingtoconducta TotalEconomicImpact™(TEI)studytoexaminethe potentialreturnoninvestment(ROI)organizationsmay realizebydeployingits Enterprise Management solutionas part of Sage Business Cloud.Thepurpose ofthisstudyistoprovidereaders withaframework to evaluatethepotentialfinancialimpactof Enterprise Managementwithintheir organizations. Tobetter understandthebenefits,costs,andrisks associatedwithaninvestmentinEnterprise Management,Forrester conducted in-depth interviews withtwoEnterprise Managementcustomers. For a brief description of each customer, see the Analysis section. According toSage,Enterprise Managementis an integratedand globalenterprise business management solution for purchasing, manufacturing, inventory, sales, customer service,and financial management. Formoredetails ontheEnterprise Management solution,seeAppendix A. For this TEI study, Forrester has created a compositeOrganizationto illustrate the quantifiable benefits and costs of investing i
Tags : 
    
Sage EMEA
By: RSM US     Published Date: Feb 08, 2019
In today’s rapidly changing economy, business leaders are constantly thinking about how to attract, engage, manage, develop and retain their talent. The brisk rate of technology transformation, the increase in demand for unique skills and the expansion of regulatory requirements all create challenges as well as opportunities around attracting and developing a diverse workforce. Quickly and effectively responding to the business needs of your employees by optimizing processes and technologies—while mitigating risk—enables you to drive growth, productivity and profitability.
Tags : 
    
RSM US
By: bChannels - Software One     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
    
bChannels - Software One
By: Larsen & Toubro Infotech     Published Date: Jan 31, 2019
LTI helped a leading global bank digitize its traditional product ecosystem for AML transaction monitoring. With the creation of a data lake and efficient learning models, the bank successfully reduced false positives and improved customer risk assessment. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech
By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to analyzing and mitigating the risks of migrating to PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. A key decision criteria for adopting any technology is whether it can support requirements for existing applications while also fitting into longer term strategies and needs. The first section of this eBook provides a detailed analysis of all aspects of migrating from legacy and commercial solutions to PostgreSQL: ? Schema and code migration ? Data migration ? Application code migration ? Testing and evaluation
Tags : 
    
Stratoscale
By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
By: Time Clock Plus     Published Date: Feb 07, 2019
For most companies, the Human Resources department has a long history of guarding sensitive employee data. Rows of beige file cabinets line a back closet where only those with a key and knowledge of the filing system have access to the personal information of countless employees. The greatest risk to this data has always been fire or water damage, but that’s quickly changing with the emergence of online data storage.
Tags : 
    
Time Clock Plus
By: Domino Data Lab     Published Date: Feb 08, 2019
As organizations increasingly strive to become model-driven, they recognize the necessity of a data science platform. According to a recent survey report “Key Factors on the Journey to Become Model-Driven”, 86% of model-driven companies differentiate themselves by using a data science platform. And yet the question of whether to build or buy still remains. This paper presents a framework to facilitate the decision process, and considers the four-year projection of total costs for both approaches in a sample scenario. Read this whitepaper to understand three major factors in your decision process: Total cost of ownership - Internal build costs often run into the tens of millions Opportunity costs - Distraction from your core competency Risk factors - Missed deadlines and delayed time to market
Tags : 
    
Domino Data Lab
By: Forcepoint     Published Date: Jan 03, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
software-defined wide area network, sd-wan, sd wan, next generation firewall, ngfw, distributed offices, digital transformation, branch security, distributed network
    
Forcepoint
By: Infosys     Published Date: Feb 12, 2019
DevOps is fast assuming greater importance in deciding the agility of an enterprise. A robust DevOps setup is crucial for successful agile delivery and minimal risks. It greatly optimizes release management costs and team productivity, resulting in reduced time to market. At the same time, DevOps enables organizations to make rapid product releases with increased quality and manage customers' expectations. In this paper we explore various aspects of DevOps. We look at key success attributes, main processes, tools, and frameworks that play an elementary role in DevOps.
Tags : 
    
Infosys
By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
    
Citrix Systems
By: Citrix Systems     Published Date: Feb 14, 2019
"Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: - Increase IT efficiency - Reduce security risks - Free IT staff to focus on more strategic initiatives"
Tags : 
    
Citrix Systems
By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.