risk

Results 1 - 25 of 2308Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 27, 2017
Among your primary responsibilities as a board member is providing advice on both business strategy and enterprise risk. A general understanding of risk management is essential when looking at cyber risk specifically. Ultimately, an enterprise should consider adding cybersecurity expertise to its board membership, but all members can benefit from increasing their understanding about how cyber risk affects corporate strategy and the overall enterprise risk profile. To provide effective strategic advice to company leadership on cyber risk, you must ask the right questions, including whether a company does ongoing cyber risk assessment and management, and how.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Digital transformation is reshaping the business landscape faster than at any time in history. It used to take decades to disrupt a market, but natively digital companies such as Uber and Airbnb have disrupted their industries in just half a decade. Digitization is creating new winners and losers at an unprecedented rate. Organizations that adopt a digital strategy will leapfrog the competition, while those that do not will risk becoming irrelevant within five years. One important step in becoming a digital enterprise is becoming an agile organization—that is, having the ability to take advantage of market opportunities faster than the competition. This shift to being an agile business has now become a top initiative for IT and business leaders. However, business agility cannot be achieved without having an agile IT infrastructure to enable it. This is why businesses spent more than $12 billion on technology to make IT more agile in 2014, according to ZK Research.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
New disruptive digital technologies are changing the face of workplace as well as worker expectations. The rapidly evolving 21st-century workforce is becoming increasingly mobile, contract-based, and technology savvy. Corporate real estate, IT, and HR leaders need to improve their work environments to suit these evolving needs, or they risk losing their employees to competition. This paper: • Discusses why your employees are disengaged • Discusses the six trends that will dominate the workforce of the future • Describes how Cisco® Workforce Experience solutions can help enable these rich workforce experiences
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : 
risk-based application security, security management, application security, software applications
    
Group M_IBM Q1'18
Published By: Lookout     Published Date: Aug 28, 2017
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
mobile risk, mobile threat, mobile vulnerabilities, enterprise device, enterprise device security
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The Practical Guide to Enterprise Mobile Security was created to help IT managers fulfll their dual role of both enabling productivity and reducing risk through the adoption of modern-enterprise mobile security practices. This guide will help answer questions you might have about implementing mobile security, identify the components that make up a holistic enterprise mobile security strategy, point out key considerations that lead to successful deployments, and provide tips on how to successfully drive adoption of that solution in your global workforce.
Tags : 
enterprise mobile security, mobile security risk, risk reduction, device security
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The adoption of mobile in the enterprise space is accelerating. Users of mobile devices choose what applications they want to use, but it is up to the enterprise to predict the data that they will be accessing. With that change, comes a new spectrum of risk that CISOs must consider.
Tags : 
mobile security, mobile devices, device security, enterprise mobile security, enterprise mobile management
    
Lookout
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
Understanding the full range of risks to enterprise data from mobility
Tags : 
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
Understanding the full range of risks to enterprise data from mobility Lookout has developed the Mobile Risk Matrix to help organisations understand the components and vectors that make up the spectrum of mobile risk – and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
If the notion of GDPR approach as an agile methodology was the thesis for this paper, the conclusion surely has to be that there is much work still to be done by the enterprise. From an obvious mismatch between the belief of board preparedness to actual preparedness, drilling down into the specific areas of storage, security and development, there’s a feeling that while organisations are now aware of the risks and the necessary philosophical practice that has – or will – become action, there is still an absence of that ‘organic’ inclusion that should make GDPR part of the furniture.
Tags : 
technology solutions, gdpr, access management, identifiable data, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
APIs represent a great opportunity for the enterprise to integrate applications quickly and easily. But APIs can be a double-edged sword: promising agility, while at the same time increasing risk. But if an organization can address API security as an architectural challenge long before any development takes place, it can reap the rewards of this technological breakthrough safely and securely.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA’s portfolio is designed to drive efficiency from planning through production. A core component of our continuous delivery portfolio is CA Release Automation, a market-leading application release automation solution that delivers full application deployment automation and release coordination across stages, environments and teams. The solution’s analytic capabilities enable DevOps teams to plan, manage, analyze and optimize the continuous delivery pipeline from a single control point. In addition, the portfolio includes CA Agile Central, CA Agile Requirements Designer, CA Service Virtualization and CA Test Data Manager. We continue to invest in and enhance the portfolio, most recently via the acquisition of BlazeMeter, an innovative, SaaS-based performance and load-testing solution.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
One way to shift testing practices earlier in your software lifecycle is by using multi-layered visual models to specify requirements in a way where all ambiguity is inherently removed. With unambiguous and complete requirements, developers introduce less defects into their code and manual test cases, automated test scripts and required test data can be automatically generated based on the requirement, without manual intervention.
Tags : 
data manager, data requirements, test automation, service virtualization, risk manager, continuous testing, testing effort, delivery ecosystem
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
    
Fiserv
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : 
cloud, aws, security, organizations, visibility, control, networks, platforms
    
Amazon Web Services
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.