operational risk

Results 1 - 25 of 61Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Sep 04, 2019
Operational resilience is high on the regulatory agenda in the UK. A joint discussion paper in 2018 took a broader view of operational resilience to cover all risks to the provision of critical business services with a greater emphasis on recovery and response when incidents occur. Regulators now place the same importance on operational resilience as on financial resilience. This represents a fundamental shift that companies are at different stages of addressing. Based on discussions with clients and regulators here are ten conversations to help guide you through this new landscape.
Tags : 
    
KPMG
Published By: Red Hat     Published Date: Jun 26, 2019
When any organization starts planning for cloud-native applications, it is important to consider the entire time span: from selecting a development platform until an application is truly production-grade and ready for delivery in the cloud. It can be a long journey, with many decisions along the way that can help or hinder progress. For example, at the beginning of a move to cloud-native development, it is easy for inefficiencies to occur if developers begin selecting tools and frameworks before they know where the application will be deployed. While enterprise developers want choice of runtimes, frameworks, and languages, organizations need standards that address the entire application life cycle in order to reduce operational costs, decrease risks, and meet compliance requirements. Organizations also want to avoid lock-in, whether it is to a single provider of cloud infrastructure or the latest architectural style. In addition, given the steep learning curve in cloud development, con
Tags : 
    
Red Hat
Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
For organisations that aim to modernise their IT environments and limit operational risks that can incur costs, IDC recommends making data protection initiatives a top priority. Modernise data protection to cut IT costs and advance IT Transformation. Modern data protection enables organisations to shrink data backup and recovery windows , which means fewer security breaches and faster resolutions when they do happen. To truly transform IT, modernise your data center to increase IT efficiency and shed technical debt while protecting your bottom line. Drive IT Transformation and results with leading enterprise solutions from Dell EMC powered by Intel.
Tags : 
    
Dell EMC & Intel
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesnt need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: Oracle     Published Date: Mar 28, 2017
The ubiquitous nature of mobile devices can seemingly diminish their value, making them a commodity to be taken for granted. But their true power hasnt begun to be tapped especially by hoteliers. If seen as a gateway to operational efficiency, enhanced guest experiences and, most importantly, a better bottom line, mobility wouldnt be overlooked. Which is exactly why its time to view it through a different prism or risk being left behind by your competitors who will.
Tags : 
mobility, mobile, hoteliers, guest experience, oracle
    
Oracle
Published By: IBM     Published Date: Sep 22, 2011
Help reduce operational costs and risk while improving accessibility of critical business data.
Tags : 
ibm, data delivery, risk reduction, cdc, soa, mdm, data management, application integration
    
IBM
Published By: Oracle     Published Date: Sep 13, 2017
5 Ways to Boost Growth By Improving the Finance Teams Effectiveness
Tags : 
operational agility, innovation, risk management, decision making, finance, smb growth
    
Oracle
Published By: First Advantage     Published Date: May 01, 2018
In the face of compressed margins, what avenues exist for multi-family providers to build revenue? The answer is found in taking full advantage of the benefits of lower vacancies and high demand by maximizing operational efficiencyand background screening can help! Below we outline best practices for three main routes to building stronger revenues. 1. Squeezing value out of lower vacancies 2. Taking technology to the next level 3. Maximizing revenue while protecting against risk
Tags : 
    
First Advantage
Published By: RSA Security     Published Date: Nov 18, 2013
This paper will explain how to achieve a balance between risk and business agility through a comprehensive approach to Operational Risk Management.
Tags : 
archer, rsa, operational risk, security, technology, business agility, comprehensive approach
    
RSA Security
Published By: IBM     Published Date: Apr 11, 2016
This paper explores why your business needs the latest operational decision management (ODM) solutions to help turn data insights into action. Discover how IBM Operational Decision Manager software and the IBM Business Process Manager platform work together to: *Recognize patterns that suggest opportunity or risk *Create and shape business events by automating decisions *Bring more dimension and precision to decision making by applying analytics to big data *Help you implement the right business processes by understanding data in context.
Tags : 
ibm, smarter process, operational decision management, odm, knowledge management, enterprise applications
    
IBM
Published By: Visier     Published Date: Nov 04, 2014
With workforce analytics, HR professionals can play a more pivotal role in their organizations to help direct senior management and hiring managers in connecting the dots between their companys overall performance and their investment in their workforce. Workforce analytics empower HR professionals to shift from being an operational function to becoming more of a strategic role within their organization. Workforce analytics uncovers deep insights into workforce data by drilling down into the data and highlighting both patterns of success to be repeated and patterns of failure that could lead to risk and impact. Go from intuition- to fact-based workforce decision-making with this comprehensive guide to workforce analytics. This eBook includes advice on how to get started, tips to ensure successful implementation, and key recommendations for finding the right solution
Tags : 
visier, workforce analytics, hr metrics, planning
    
Visier
Published By: Determine (Selectica)     Published Date: Jun 29, 2017
As our unpredictable world becomes more complex, interdependent and dangerous, its becoming harder to manage third-party risk. Traditional financial and operational risks seem like the good old days. Now procurement has to manage, mitigate and avoid risks as disparate as conflict minerals, cybercrime, natural disasters, resource depletion and many others.
Tags : 
    
Determine (Selectica)
Published By: Stratus Technologies     Published Date: Jan 31, 2017
he pursuits to reduce costs and avoid unplanned downtime remain primary operational goals in industrial plants. A convergence of factors has created an opportunity for industrial organizations such as manufacturing, oil and gas, chemicals and water treatment companies to aggressively pursue both. Although the pace of investment can be relatively slow in industrial automation (IA), technological advances, economic trends and market pressures have created an environment in which plants are compelled to modernize operational technology (OT) in order to ensure maximum efficiency and minimum process interruptions. Simply put, OT is getting old. The industrial sector is heavily capital-intensive and traditionally utilizes equipment with long lifecycles. Organizations with such outdated automation systems are in dire need of OT modernization to keep up with the pace of change, customer demands and business priorities, and reduce the risk of critical failures and costly downtime. Download th
Tags : 
stratus, performance improvements, downtime, operations, unplanned downtime, operational technology
    
Stratus Technologies
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: Time and money wasted by manual on-and off-boarding, and lost passwords. Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they dont get access quickly enough, or not at all. Worst case, because todays IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: First Advantage     Published Date: Apr 17, 2018
In the face of compressed margins, what avenues exist for multi-family providers to build revenue? The answer is found in taking full advantage of the benefits of lower vacancies and high demand by maximizing operational efficiencyand background screening can help! Below we outline best practices for three main routes to building stronger revenues. 1. Squeezing value out of lower vacancies 2. Taking technology to the next level 3. Maximizing revenue while protecting against risk
Tags : 
    
First Advantage
Published By: BMC ESM     Published Date: Aug 20, 2009
Automating your data center can improve operational efficiency and give you control over service quality, security, and business agility, while simultaneously reducing risk and costs.
Tags : 
data center, operational efficiency, service, security, business agility, automation, bmc, esm
    
BMC ESM
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
You cant slow down technology. But you can get ahead of it. Learn how in this mobile trend report from Gartner. Learn the latest in devices, app stores, and cloud services. Youll even get operational tips to manage mobile costs, risk, and support.
Tags : 
consumerization, mobile technology, infrastructure and operations, mobile management, mobile security, enterprise mobility, mobile application management
    
Good Technology Corporation
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
    
Tenable
Published By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloudwhile enjoying increased levels of control and securitycan help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : 
cloud, cloud security, efficiency, security, public cloud
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 27, 2015
In theory, software-defined networking empowers businesses to accelerate time-to-market, lower administrative costs, and reduce operational risk. In reality, only a programmable software-defined network can deliver those benefits. This white paper explains programmabilitys pivotal role in realizing the promise of SDN, outlining all of the components companies need to build a software-defined network thats fully programmable at Layers 2 and 3 and Layers 4 to 7.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility, it solutions
    
F5 Networks Inc
Published By: Oce Business Services     Published Date: Mar 24, 2008
Effective records management has never been more crucial to meeting corporate governance, risk management and operational mandates. Yet half of enterprises lack a fully implemented records management program. Download this white paper to learn how strategic outsourcing can help you mitigate risks, apply best practices, meet compliance mandates and improve overall records management ROI.
Tags : 
oce, records management, knowledge management, compliance, best practices, document management, information management
    
Oce Business Services
Published By: IBM     Published Date: Oct 13, 2017
Analytics is game-changing and can produce valuable insights from the ever-growing volume, velocity and variety of data. Business Intelligence (BI) provides the foundation for many types of Analytics. It enables companies to deliver exceptional customer experience, enhance marketing effectiveness, increase operational efficiencies, reduce financial risks, improve product quality and reliability, and so on. But businesses are also challenged to generate timecritical actionable insights and make a compelling financial business case for BI investments.
Tags : 
ibm, cognos analytics, business intelligence, customer experience, marketing
    
IBM
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.