Risk Management White Papers

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 1 - 25 of 324Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Sep 25, 2008

Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.

Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, application security, email security, security management, mobile workers, business process automation, business process management, collaboration, collaborative commerce, messaging
    
By: iShares by BlackRock     Published Date: Apr 20, 2018

Ron Ratcliffe and Russ Koesterich of BlackRock, discuss how their roles and perspectives on risk have evolved as factor investing has become more widespread. By submitting this form you agree to share your contact information with BlackRock and to follow-up communication. Carefully consider the Funds' investment objectives, risk factors, and charges and expenses before investing. This and other information can be found in the Funds' prospectuses or, if available, the summary prospectuses which may be obtained by visiting www.iShares.com or www.blackrock.com. Read the prospectus carefully before investing. Investing involves risk, including possible loss of principal. FOR INSTITUTIONAL USE ONLY. Prepared by BlackRock Investments, LLC. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with Madison Logic.

Tags : ishares, risk, risk management, factors, factor investing, futures, options, commodities, finance
    
By: iShares by BlackRock     Published Date: Apr 19, 2018

This paper takes a look at current trends and explains, through case studies, how asset managers can use factor strategies to evaluate portfolios, enhance insights, and pursue alpha in a way that is complementary to current investment approaches. By submitting this form you agree to share your contact information with BlackRock and to follow-up communication. Carefully consider the Funds' investment objectives, risk factors, and charges and expenses before investing. This and other information can be found in the Funds' prospectuses or, if available, the summary prospectuses which may be obtained by visiting www.iShares.com or www.blackrock.com. Read the prospectus carefully before investing. Investing involves risk, including possible loss of principal. FOR INSTITUTIONAL USE ONLY. Prepared by BlackRock Investments, LLC. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with Madison Logic.

Tags : ishares, asset management, investment, risk management, energy, futures, options, fixed income/bonds, commodities, financial advisors, finance
    
By: iShares by BlackRock     Published Date: Apr 19, 2018

In this paper, we examine the evolution of the bond market through three interconnected lenses: the liquidity environment, market structure and product preferences. By submitting this form you agree to share your contact information with BlackRock and to follow-up communication. Carefully consider the Funds' investment objectives, risk factors, and charges and expenses before investing. This and other information can be found in the Funds' prospectuses or, if available, the summary prospectuses which may be obtained by visiting www.iShares.com or www.blackrock.com. Read the prospectus carefully before investing. Investing involves risk, including possible loss of principal. FOR INSTITUTIONAL USE ONLY. Prepared by BlackRock Investments, LLC. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with Madison Logic.

Tags : ishares, bonds, bond market, liquids, risk management, fixed income/bonds, financial advisors, capital, finance
    
By: Maplesoft     Published Date: Dec 27, 2017

Learn how the technique of virtual commissioning promises to reduce the significant delays and costs associated with the difficult task of system integration and commissioning.

Tags : maplesoft, virtual commissioning, manufacturing automation, product design, system integration, application integration, performance testing, product lifecycle management, risk management, simulation software, data integration, project management, manufacturing execution systems
    
By: FICO     Published Date: May 11, 2017

A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.

Tags : customer experience, credit, credit policies, customer interaction service, customer relationship management, customer satisfaction, customer service, risk management, finance
    
By: FICO     Published Date: May 11, 2017

Agencies have long provided telecommunications companies with scalability for collections in a high-growth industry. Today, with markets and business models changing, your collections agencies have a growing impact — for good or ill — on your success.

Tags : customer experience, analytics, risk management, customer interaction service, customer relationship management, customer satisfaction, customer service, finance
    
By: FTI Consulting     Published Date: Mar 03, 2017

2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.

Tags : fti, fti consulting, crisis management, corporate risk, cyber attacks, political disruption, corporate crisis, business continuity, security policies, best practices, risk management, project management, vulnerability management, business technology, social media, reputation monitoring
    
By: Infor     Published Date: Mar 03, 2017

It is the best of times and the worst of times for elite finance professionals in mid- to largesized organizations. With demands for more information, faster, going nowhere but up, and finance departments playing an increasingly strategic role in determining business direction, CFOs, Controllers and their staffs are finding themselves intellectually stimulated and exhausted in equal measure.

Tags : finance, cfo, finance process, data analysis, risk management
    
By: Blackboard     Published Date: Jan 24, 2017

This paper reveals the benefits and risk of moving to a new learning environment.

Tags : new learning environment, tech for education, learning, blackboard, tech, application integration, risk management, elearning
    
By: Oracle     Published Date: Sep 06, 2016

Learn why our world-leading, unified solution is relied on by market-leading companies across the planet.

Tags : supply chain, supply chain management, oracle, security, security application, cloud computing, unified solution, risk, application security, internet security, security management, security policies, risk management, virtualization
    
By: Qlik     Published Date: Aug 31, 2016

Qlik apps are used by teams in head-office functions like group finance or risk. Here's a list of the top 12 solutions that are the most popular, and offer the greatest business value.

Tags : qlik, finance solutions, risk, insurance, claims management, cvs, sales performance, risk management, information management, records management, spend management, expense management, business technology, finance
    
By: NAVEX Global     Published Date: Aug 18, 2016

In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.

Tags : compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas, security management, risk management
    
By: Diligent     Published Date: Aug 05, 2016

This white paper examines how to establish a crisis management plan and the necessary communications infrastructure prior to the trigger event.

Tags : crisis management, crisis management plan, corporate crisis, project management, risk management
    
By: Patsnap     Published Date: Jul 25, 2016

IP data can be used for a lot more than traditional patent searching. In this white paper we look at how the insights from IP can be used to identify and mitigate risks. And we used virtual reality as our guide.

Tags : virtual reality, vr headset, oculus rift, head mounted display, immersive experience, microsoft, risk management, analytical applications, virtualization, infrastructure
    
By: Diligent     Published Date: Jun 15, 2016

This white paper examines how to establish a crisis management plan and the necessary communications infrastructure prior to the trigger event.

Tags : crisis management, crisis management plan, corporate crisis, risk management, virtualization, cloud computing, infrastructure
    
By: YLD     Published Date: Apr 27, 2016

IT departments are faced with new challenges, with increased competition, lower customer loyalty and globalisation. It all requires faster development while dealing with shadow IT, legacy systems and requirements for highly skilled teams, with expertise in new, disruptive technologies.

Tags : it department, customer loyalty, technology, it support, becoming a disruptive cio, it management, application security, return on investment, risk management
    
By: LogicNow     Published Date: Mar 10, 2016

Cyber crime is one of the most innovative businesses in existence today – and make no mistake, it is a business. This guide looks at how cyber crime has evolved and continues to evolve - and the necessity now of taking a user-focused approach to network security. If you’re in the business of helping your customers businesses stay secure – or if you’re thinking about it

Tags : logicnow, web protection, cyber crime, cyber security, security, best practices, enterprise software, risk management
    
By: LogicNow     Published Date: Mar 10, 2016

Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).

Tags : managed services, cyber security, logicnow, cyberdefense, security, best practices, business activity monitoring, risk management
    
By: Akamai Technologies     Published Date: Mar 10, 2016

The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.

Tags : akamai technology, web application security, http, best practices, security, risk management
    
By: Zooz Payments     Published Date: Feb 11, 2016

This white paper will describe the main problems merchants face when it comes to customer conversions and payment acceptance, and suggest solutions that will enable you to increase your conversion rate.

Tags : online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems, process online payments, risk management, finance, payment processing, shopping cart software, trust and security
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Learn how XenMobile uses EMM to enable BYOD and CYOD/COPE mobility programs without impacting user experience, and without inflating costs or introducing security risks.

Tags : citrix, byod, strategy, mobile, mdm, mobile app management, emm, mobility, infrastructure, ip networks, ip telephony, hacker detection, internet security, security management, security policies, risk management, data protection, collaboration, messaging, mobile device management
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

Tags : citrix, security, enterprise, mobility, mobile computing, mobile workers, wireless infrastructure, it spending, risk management, data protection, messaging, mobile device management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.