risk

Results 1 - 25 of 2427Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Dec 13, 2013
Interested in running a Hadoop proof of concept on enterprise-class storage? Download this solutions guide to get a technical overview on building Hadoop on NetApp E-series storage. NetApp Open Solution for Hadoop delivers big analytics with preengineered, compatible, and supported solutions based on high-quality storage platforms so you reduce the cost, schedule, and risk of do-it-yourself systems and relieving the skills gap most organizations have with Hadoop. See how on going operational and maintenance costs can be reduced with a high available and scalable Hadoop solution.
Tags : open solutions, hadoop solutions guide
     NetApp
By: NetApp     Published Date: Dec 13, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson, as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : big data problems, how to get the most from your big data
     NetApp
By: NetApp     Published Date: Dec 14, 2013
Read how the NetApp Distributed Content Repository Solution is an efficient and risk-reducing active archive solution. Based on customer data, Forrester created a composite organization and concluded that the NetApp Distributed Content Repository delivered a three year ROI of 47% with a payback period of 1.3 months. The key benefits are reduced risk of losing unregulated archived data, denser storage, storage solution efficiency, and compliance for regulated data. The study also provides readers with a framework to do their own financial impact evaluation. Source: The Total Economic Impact Of The NetApp Distributed Content Repository Solution (StorageGRID On E-Series), a commissioned study conducted by Forrester Consulting on behalf of NetApp, March 2013.
Tags : forrester tei
     NetApp
By: IBM     Published Date: Sep 02, 2014
With tougher regulations and continuing market volatility, financial firms are moving to active risk management with a focus on counterparty risk. Firms are revamping their risk and trading practices from top to bottom. They are adopting new risk models and frameworks that support a holistic view of risk. Banks recognize that technology is critical for this transformation, and are adding state-of-the-art enterprise risk management solutions, high performance data and grid management software, and fast hardware. Join IBM Algorithmics and IBM Platform Computing to gain insights on this trend and on technologies for enabling active "real-time" risk management.
Tags : 
     IBM
By: IBM     Published Date: Sep 02, 2014
In today’s stringent financial services regulatory environment with exponential growth of data and dynamic business requirements, Risk Analytics has become integral to businesses. IBM Algorithmics provides very sophisticated analyses for a wide range of economic scenarios that better quantify risk for multiple departments within a firm, or across the enterprise. With Algorithmics, firms have a better handle on their financial exposure and credit risks before they finalize real-time transactions. But this requires the performance and agility of a scalable infrastructure; driving up IT risk and complexity. The IBM Application Ready Solution for Algorithmics provides an agile, reliable and high-performance infrastructure to deliver trusted risk insights for sustained growth and profitability. This integrated offering with a validated reference architecture delivers the right risk insights at the right time while lowering the total cost of ownership.
Tags : ibm, it risk, financial risk analytics
     IBM
By: IBM     Published Date: Sep 16, 2015
The impact of the 2008 financial crisis affects not only Sell Side firms - the focus of discussions - but Buy Side and Insurance firms. Dodd Frank Act targets all systemically important firms. This study conducted in partnership with Waters Technology, an Incisive Media publication, focuses these firms. The report finds that they are facing intense pressure on multiple fronts including stricter liquidity and solvency risk regulations, and changing market conditions. Like Sell Side firms, they require more innovative business models and analytics to meet these challenges and to deliver growth and performance.
Tags : 
     IBM
By: IBM     Published Date: Sep 04, 2013
This white paper outline the vale of the big data that continues to accumulate within your organization. It show how by making this data more accessible to relevant stakeholders you can unlock the value and insights, while minimizing risk.
Tags : 
     IBM
By: IBM     Published Date: Feb 13, 2015
To quickly and economically meet new and peak demands, Platform LSF (SaaS) and Platform Symphony (SaaS) workload management as well as Elastic Storage on Cloud data management software can be delivered as a service, complete with SoftLayer cloud infrastructure and 24x7 support for technical computing and service-oriented workloads. Watch this demonstration to learn how the IBM Platform Computing Cloud Service can be used to simplify and accelerate financial risk management using IBM Algorithmics.
Tags : 
     IBM
By: Kx Systems     Published Date: Jan 16, 2015
?Kdb+ is a column-based relational database with extensive in-memory capabilities, developed and marketed by Kx Systems. Like all such products, it is especially powerful when it comes to supporting queries and analytics. However, unlike other products in this domain, kdb+ is particularly good (both in terms of performance and functionality) at processing, manipulating and analysing data (especially numeric data) in real-time, alongside the analysis of historical data. Moreover, it has extensive capabilities for supporting timeseries data. For these reasons Kx Systems has historically targeted the financial industry for trading analytics and black box trading based on real-time and historic data, as well as realtime risk assessment; applications which are particularly demanding in their performance requirements. The company has had significant success in this market with over a hundred major financial institutions and hedge funds deploying its technology. In this paper, however, we wa
Tags : kx systems, kdb+, relational database
     Kx Systems
By: Hewlett Packard Enterprise     Published Date: Feb 05, 2018
Now there's an innovative new way to move enterprise applications to the public cloud while actually reducing risks and trade-offs. It's called multi-cloud storage, and it's an insanely simple, reliable, secure way to deploy your enterprise apps in the cloud and also move them between clouds and on-premises infrastructure, with no vendor lock-in. Multi-cloud storage allows you to simplify your infrastructure, meet your service-level agreements, and save a bundle.
Tags : hpe, multicloud, storage, private cloud, public cloud, digital
     Hewlett Packard Enterprise
By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
     Limelight
By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
     Limelight
By: APC by Schneider Electric     Published Date: Apr 16, 2018
Power system operators have lots of questions about the aging switchgear they maintain: • How can we reduce risk for an outage or arc flash event? • What kind of project is required to fix my problems? • Is total replacement my best option? Find answers in "Answer Guide: Make Aging Switchgear Last Longer and Perform Better." Learn the benefits and how-tos of switchgear modernization and see easy-to-install solutions for any OEM's equipment.
Tags : switchgear modernization, mv circuit breakers, lv circuit breakers, switchgear upgrades, electrical distribution equipment, schneider electric, circuit breaker upgrade, obsolete switchgear
     APC by Schneider Electric
By: APC by Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
     APC by Schneider Electric
By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
     Lookout
By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
     Lookout
By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
     Lookout
By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
     Lookout
By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : protection, ddos, security, reporting, organization, device
     F5 Networks Inc
By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : black duck software, open source, platform, sap, multi-source, code, source, agile development
     Black Duck Software
By: MobileIron     Published Date: Apr 11, 2018
The enterprise landscape has changed dramatically with the influx of millennials — and their preferred devices — into the workforce. As a result, Macs that were once limited to mostly niche usage are now rapidly expanding their enterprise footprint. These devices require the same level of security and oversight that organizations apply to all of their other devices. Otherwise, the risk of leaving Macs either unmanaged or secured by point products creates security gaps that can leave the enterprise open to cyberattacks and compliance violations. The good news is, MobileIron makes it easy to secure Macs the same way all other devices in the enterprise are managed. No integrations, additional training, or learning curves are involved. The time has come for a modern approach to Mac management that is seamless for end users, improves operational efficiency, and simplifies IT operations across the entire device lifecycle. MobileIron makes it all possible.
Tags : macos, modern, work, era, devices, workforce, organizations
     MobileIron
By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : endpoint, management, enterprise, mobility, business
     VMware AirWatch
By: Genesys     Published Date: Feb 22, 2018
Customer expectations have changed. Self-service options on the channels of their choice are a given. And when self-service is not enough, they want live agents who can step up and make it a seamless transition. Take a new approach to customer engagement today—or your customers won’t be back tomorrow.
Tags : frost & sullivan, contact center, omnichannel solution, customer engagement
     Genesys
By: Group M_IBM Q1'18     Published Date: Feb 15, 2018
IBM SPSS predictive analytics solutions help uncover key predictors that lead to online student success or failure. Identifying specific issues early, target intervention measures for at-risk students, and take the appropriate steps to help improve online student graduation rates.
Tags : online education, online students, graduation rates, spss
     Group M_IBM Q1'18
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com