risks

Results 76 - 100 of 984Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against todayís security risks.
Tags : hardware, tpm, it security, windows, telecommunication, byod
     Dell
By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organizationís data in an increasingly mobile world.
Tags : security risks, byod, cyber attacks, byod policies
     Dell
By: Dell     Published Date: Oct 24, 2014
Today's business environments are very different to those of 10 years ago. Windows Server 2003 has been a trusted friend for over a decade, but there are better ways to deliver against today's business expectations and technical possibilities. Download this paper to better understand the risks of ignoring the end of support and to discover the advantages of migrating to a modern data center platform.
Tags : virtualization, it security, platform support, platform migration
     Dell
By: Dell     Published Date: Oct 24, 2014
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores the Windows migration options that are available to customers and the benefits associated with a modernization effort. It also evaluates the risks that customers face if they do not move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : server migration, product support cycle, server compatibility, it support
     Dell
By: Dell     Published Date: Oct 24, 2014
The cloud, virtualization, and virtual desktop infrastructure (VDI) help make IT's life easier ó and the whole organization more agile ó but each of these features also presents serious security challenges. Although there is no one-size-fits-all solution to managing security in the enterprise 2.0 world, the enhanced security features and user-centric offerings in Microsoft Windows Server 2012 make security a much more comfortable proposition for IT. Read this technology brief to learn how Windows Server 2012 helps to mitigate risks and streamline compliance, as well.
Tags : virtualization, vdi, it compliance, it security
     Dell
By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : entrepreneurship, human resources, managing risk, compliance, risk management
     TriNet
By: TriNet     Published Date: Jun 13, 2011
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : trinet, entrepreneur, peo, professional employer organization, smb, human resources, co-employment, talent market
     TriNet
By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : entrepreneurship, human resources, managing risk, compliance, risk management
     TriNet
By: TriNet     Published Date: Nov 26, 2012
Human resources outsourcing is still a relatively new concept for many organizations, resulting in a number of perceived and actual risks; however, if these risks are understood and addressed early on, it can lead to a successful, strategic relationsh
Tags : human resources, hr outsourcing, smbs, small to medium businesses
     TriNet
By: Collaborative Consulting     Published Date: Dec 20, 2013
There are many attributes to consider when choosing sourcing options, some more obvious than others, such as hourly rate. However, when evaluating the true costs of sourcing, leading organizations also look at other critical factors associated with business-critical projects--such as agility, integration with other operations, security risks, scalability, public image, and business understanding-- that can make all the difference to ensuring successful project outcomes.
Tags : collaborative consulting, domestic solution, sourcing model, cost comparison, constrained workforce, offshore, financially constrained, user interaction
     Collaborative Consulting
By: Collaborative Consulting     Published Date: Jan 15, 2014
When a pharmaceutical company discovered its risks under the new Patient Protection and Affordable Care Act, it turned to Collaborative to comb and consolidate its data. The result: compliance and insight into new business opportunities, too, through a company-wide business data warehouse and enhanced business intelligence.
Tags : collaborative consulting, data, data warehouse, complicane, risk management, business intelligence, consolidation, infrastructure
     Collaborative Consulting
By: Dell     Published Date: Feb 04, 2015
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores the Windows migration options that are available to customers and the benefits associated with a modernization effort. It also evaluates the risks that customers face if they do not move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : 
     Dell
By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : mobile security, solutions, websense, mobile security, solutions, major it security strategy, security, it management
     Websense
By: Dell     Published Date: Feb 02, 2015
While Windows 7 and Windows XP continue to dominate the market, Windows 8 adoption has been fairly slow, especially in the enterprise. The end of support for Windows XP now creates a season of needed change. Prepare now to address both the challenges and opportunities of this wave of OS migrations by downloading this IT handbook. Read it for insights into planning and preparation, hardware and software compatibility considerations, as well as end user training and implementation.
Tags : dell, windows, productivity, security, apps, integration, platforms, microsoft
     Dell
By: Dell     Published Date: Feb 02, 2015
Many enterprises, educational institutions, and government agencies find themselves still managing both legacy end-user hardware and an antiquated OS. The time has come to move to modern Windows options and given the gamut of robust computing hardware, upgrading both at once simply makes good sense. Download this paper to discover how your organization can benefit from the combination of reduced staff costs, fewer operational problems, lower operational costs and improved productivity, the organization realizes significant cost savings.
Tags : dell, windows, productivity, security, apps, integration, platforms, microsoft
     Dell
By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
     RMS
By: RES Software     Published Date: Apr 05, 2013
IT organizations are on the brink of a new wave of desktop transformation, with Windows 7 operating system (OS) migrations a critical stop on the journey. These OS migrations are extremely complex and pose real risks in terms of end user downtime, business interruptions, and increased costs. IT needs to ensure migration projects go quickly and smoothly, and that the resulting user environment becomes easier to access and manage.
Tags : desktop evolution, enterprise-wide desktop evolution, infosys, boosting user production, prevent downtime, prevent business interruptions
     RES Software
By: Caristix     Published Date: May 03, 2013
Learn why scoping is critical when it comes to interoperability and HL7.
Tags : hl7, integration, interface, midical, heathcare, costs, risks, interfacing project
     Caristix
By: Caristix     Published Date: May 03, 2013
The costs and risks associated with the entire interfacing lifecycle are no longer acceptable in a world that requires fast turnarounds and go-live dates. Those implementing HL7 interfaces can tap into new Ė and proven Ė best practices for more effective scoping and overall project success.
Tags : hl7, integration, interface, midical, heathcare, costs, risks, interfacing project
     Caristix
By: ShoreTel     Published Date: Oct 26, 2012
Total cost of ownership is a key metric for assessing costs, benefits and risks of a UC solution, enabling organizations to properly evaluate competing solutions. This white paper examines the total cost of ownership measured in different ways.
Tags : shoretel, unified communications solutions, ucs, total cost of ownership, telecom, telecom solution, benchmarking, enterprise applications
     ShoreTel
By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
     Venafi
By: SAP     Published Date: Dec 04, 2015
This report investigates the organisational measures companies must take to address the totality of the risks they face. The report is based on interviews with the following executives and experts.
Tags : risk management, risks, cfo, finance executives, holistic risk management
     SAP
By: Pega     Published Date: Apr 04, 2016
Millennials are different than any other generation before them. They are making major decisions later in lifeófrom choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
     Pega
By: Akamai Technologies     Published Date: Sep 04, 2019
Itís a bold claim; one that hasnít always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, itís that security-related incursions are inevitable. And itís news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, thereís no longer a choice. As a CIO, CISO, or other security or IT leader, you know itís your job to be the central agent stressing the connections between business and digital risk. Itís your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. Thatís up from 40% in 2018. Whether youír
Tags : 
     Akamai Technologies
By: Citrix ShareFile     Published Date: Jul 02, 2019
Today's businesses need to drive innovation to seize new opportunity, but cloud complexities can slow the agility needed for that innovation. That doesn't have to be the case. In fact, over fifty percent of organizations now use a multi-cloud strategy to help determine their cloud needs, and if you don't have one, we can help. Citrix Workspaces helps reduce cloud complexity, minimize security risks, and deliver a better user experience. Download our e-book and find out how a secure digital workspace: ē Centralizes workspace management ē Secures your SaaS and web apps, data, and clouds ē Makes it a lot easier to scale your cloud infrastructure as needed
Tags : 
     Citrix ShareFile
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com