Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER:
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007
|
|
|
Commerzbank: Managing Credit Risk and Increasing Operational Efficiency
sponsored by EMC Corporation
CASE STUDY:
For Commerzbank streamlining the corporate credit lines to corporations and institutions, streamlining the corporate credit lending process to reduce paper and drive down costs had become a top priority.
Posted: 16 Jun 2008 | Published: 01 Jul 2005
|
|
|
The Evolution of Asset Management
sponsored by IBM Line of Business
WHITE PAPER:
This paper will discuss key perspectives and strategies for new asset management programs within the most capital intensive and revenue producing area of today's businesses.
Posted: 16 Jun 2008 | Published: 01 Feb 2008
|
|
|
Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk
sponsored by IBM Line of Business
WHITE PAPER:
Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price.
Posted: 12 Jun 2008 | Published: 01 Apr 2007
|
|
|
e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
sponsored by Symantec Corporation
BOOK:
The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.
Posted: 09 Jun 2008 | Published: 07 Jun 2008
|
|
|
3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER:
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008
|
|
|
A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER:
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007
|
|
|
Remote Data Protection
sponsored by IBM
WHITE PAPER:
Thanks to IBM's Remote Data Protection Service you can efficiently back up your data so that it can be more easily recovered in the event of a disaster. This pay-as-you-use subscription service includes hardware, software and operational support.
Posted: 29 May 2008 | Published: 29 May 2008
|
|
|
CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program
sponsored by Qualys, Inc.
CASE STUDY:
CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations.
Posted: 10 May 2008 | Published: 01 Nov 2006
|
|
|
Oracle Global IT (GIT) Streamlined Security
sponsored by Qualys, Inc.
CASE STUDY:
With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
Posted: 10 May 2008 | Published: 01 Apr 2007
|
|
|
SAP GRC Access Control Solution
sponsored by HCL Software
WHITE PAPER:
This white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning.
Posted: 09 May 2008 | Published: 01 Jan 2008
|
|
|
The New Information Agenda - Do You Have One?
sponsored by IBM
WHITE PAPER:
The cost and complexity of managing increasing volumes of data and content, combined with the need to provide trusted information to every user for every transaction, is driving CIOs to rethink their approach to information delivery.
Posted: 09 May 2008 | Published: 01 Jan 2008
|
|
|
The Impact of Messaging and Web Threats
sponsored by Trend Micro, Inc.
WHITE PAPER:
This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
Posted: 09 May 2008 | Published: 01 Apr 2008
|
|
|
EMC Backup and Recovery
sponsored by EMC Corporation
SOFTWARE LISTING:
EMC Backup and Recovery solutions enable you to strengthen your data protection, streamline backup and recovery, and meet a wide range of service levels, even for the largest data volumes.
Posted: 28 Apr 2008 | Published: 01 Apr 2008
|
|
|
Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER:
What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates.
Posted: 25 Apr 2008 | Published: 01 Apr 2008
|
|
|
Surviving the Perfect Storm in the Food Industry
sponsored by CDC Software - Ross Enterprise
WHITE PAPER:
This paper presents an executive perspective on the underlying challenges in the food industry.
Posted: 14 Apr 2008 | Published: 01 Apr 2008
|
|
|
Manufacturing Company Increases Productivity While Managing Risk
sponsored by Sunrise Technologies
CASE STUDY:
Companies rely on its enterprise resource planning (ERP) system to help manage finances, manufacturing, and the supply chain. Learn how one companied increased productivity while managing risk with a reliable, efficient and adaptable solution.
Posted: 19 Mar 2008 | Published: 01 Jan 2007
|
|
|
Best Practices in Data Management
sponsored by SAS
WHITE PAPER:
The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM.
Posted: 06 Mar 2008 | Published: 01 Jan 2007
|
|
|
Managing a Retail Bank's Facilities for Competitive Advantage
sponsored by VFA, Inc.
WHITE PAPER:
This paper focuses on how retail banks can more effectively manage their facilities - branch locations, back offices or data centers - and align facility management and spending with business goals.
Posted: 05 Mar 2008 | Published: 01 Jan 2006
|
|
|
IBM Dynamic Inventory Optimization Solution: Helping Improve the Bottom Line through Inventory Optimization
sponsored by IBM Line of Business
PRODUCT LITERATURE:
The IBM Dynamic Inventory Optimization Solution is designed to help companies manage inventory to optimal levels, providing the potential to reduce carrying and logistical costs, increase service levels and improve asset utilization and invento...
Posted: 03 Mar 2008 | Published: 01 Sep 2006
|
|
|
Manage Risk and Address Return on Investment with IBM Compliance Solutions
sponsored by IBM Software Group
WHITE PAPER:
Governance, risk management and compliance place high expectations on IT to establish, enforce and prove the efficacy of policies, processes and controls.
Posted: 15 Feb 2008 | Published: 01 Mar 2007
|
|
|
Data Center Transformation
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This paper looks at HP's approach to Data Center Transformation and how it can help enterprise data centers reduce costs, manage risks, and support business growth.
Posted: 14 Feb 2008 | Published: 01 Sep 2007
|
|
|
NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection
sponsored by Symantec Corporation
WHITE PAPER:
Symantec's Veritas NetBackup 6.5, the latest release of the company's established market-leading enterprise backup and recovery solution, provides disk-based data protection for remote office and enterprise datacenter environments.
Posted: 07 Feb 2008 | Published: 01 Nov 2007
|
|
|
Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER:
Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008
|
|
|
2006 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER:
Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
Posted: 28 Dec 2007 | Published: 01 Oct 2006
|
|