value at risk

Results 1 - 25 of 93Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Oct 15, 2019
Consumers have become more educated about the value of data and cyber risks associated with it. As consumer awareness increases so does their expectations of trust and digital security. Read now KPMG's report Trust in the time of disruption to understand the cybersecurity gap that exists between consumers and organisations, and what asset management and financial services firms as a whole can do to close the trust gap.
Tags : 
    
KPMG
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: Dell EMC     Published Date: Oct 30, 2019
As data volumes grow larger every year, businesses that adopt more sophisticated approaches to storing and deriving value from that data benefit in terms of performance, scalability, and cost. How do you migrate effectively to the latest storage and infrastructure technologies, while also mitigating the associated disruption and risk? Download this overview from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Resolver     Published Date: Nov 01, 2019
As risk professionals, you’re tasked with the responsibility to minimize and mitigate risk, all while battling skeptical and reluctant executives for increased budget and more resources. The risk management paradox is a tough pill to swallow. When you’re doing your job well, nobody notices. And when something goes wrong, you’re the scapegoat. So, how do you prove the value of something not happening? In partnership with The Risk Management Society (RIMS), Resolver hosted a webinar to answer questions many risk managers struggle with: - How do you prove the value of an ERM program? - Who is ultimately responsible for risk management? - What metrics and KRIs should you track to measure the impact of your ERM program? - How do you encourage risk-based decision making across the enterprise? - How can technology be leveraged to maximize the value of an ERM program? Complete the form for access to the full webinar video that will help your team make the case for an ERM program.
Tags : 
    
Resolver
Published By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI. Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills. Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI. Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills.
Tags : 
    
MicroStrategy
Published By: CFA Institute     Published Date: Oct 07, 2019
Performance evaluation is coming of age. Once a narrow, back office role focused solely on crunching returns, it has become ever more integrated into the DNA of investment firms. Both internally and externally, performance evaluation adds value, helping senior management make key judgement calls where the difference between the right solution and the wrong solution is the difference between growth or decline. The performance analyst of the future will provide valuable input into nearly every area of an investment firm. What began as a mathematical task—calculating investment returns—is morphing into something much broader. The objective of performance evaluation today is determining what is behind the return being analyzed. What were the key drivers—allocation or selection? What risk was taken to achieve the return? Was it skill, or was it luck, that produced the return?
Tags : 
    
CFA Institute
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Nov 01, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Nov 28, 2017
Today’s leading-edge organizations differentiate themselves through analytics to further their competitive advantage by extracting value from all their data sources. Other companies are looking to become data-driven through the modernization of their data management deployments. These strategies do include challenges, such as the management of large growing volumes of data. Today’s digital world is already creating data at an explosive rate, and the next wave is on the horizon, driven by the emergence of IoT data sources. The physical data warehouses of the past were great for collecting data from across the enterprise for analysis, but the storage and compute resources needed to support them are not able to keep pace with the explosive growth. In addition, the manual cumbersome task of patch, update, upgrade poses risks to data due to human errors. To reduce risks, costs, complexity, and time to value, many organizations are taking their data warehouses to the cloud. Whether hosted lo
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
    
Fortinet EMEA
Published By: Dell EMC     Published Date: Oct 10, 2019
Security leaders have been in front of boards and executive committees long enough to know that security metrics that simply portray statistics from monitoring tools, or count the number of malware attacks, add relatively little value to strategy and budget decisions. Protecting sensitive customer and company data shouldn’t be just a compliance obligation, it should be a business imperative. This is exactly why the right technology partners will help push security, risk, and compliance objectives forward. In March 2019, Dell commissioned Forrester Consulting to evaluate the evolving security trends and technology needed to protect and enable employees. Our study found that empowering employees while adhering to security protocols improves employee productivity. Forrester conducted an online survey of 887 senior business and IT decision makers to explore this topic. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Emerson Network Power     Published Date: Feb 07, 2011
In this whitepaper, we will explain trends that drive management challenges that data center operators are faced with. We will then show you the value proposition of Emerson's solutions, which can help you to: . Adapt data center infrastructure without increased cost; . Improving efficiency without added risk; . Maximize existing infrastructure investments; . Ensure availability of mission-critical services; and . Extend the life of existing infrastructure. Read on for more.
Tags : 
emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud
    
Emerson Network Power
Published By: Pega     Published Date: Apr 04, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: GE Healthcare     Published Date: Aug 27, 2015
The shift to value-based reimbursement (VBR) entails more financial risk for providers. Successful management of the transition to VBR can only be achieved when healthcare organizations are clinically and financially integrated to ensure tight care coordination and efficient resource utilization. That level of integration requires the aid of a robust IT infrastructure to support the enterprise. This whitepaper offers the opportunity to learn about new tools for healthcare providers to manage financial challenges associated with value-based reimbursement
Tags : 
centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing rcm, episodic payment, accountable care
    
GE Healthcare
Published By: Pega     Published Date: May 24, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: Emarsys - APAC     Published Date: Jun 12, 2019
Customer retention marketing aims to create engaged customers that return to a store or a website again and again. It’s a major shift in focus that recognizes the value of marketing to your existing customer base rather than constantly trying to grow it. Retention and e-commerce marketing success go hand-in-hand; without a strategy to maintain lasting relationships with customers, brands risk losing valuable data, deals, and dollars.
Tags : 
    
Emarsys - APAC
Published By: Oracle     Published Date: Mar 28, 2017
The ubiquitous nature of mobile devices can seemingly diminish their value, making them a commodity to be taken for granted. But their true power hasn’t begun to be tapped — especially by hoteliers. If seen as a gateway to operational efficiency, enhanced guest experiences and, most importantly, a better bottom line, mobility wouldn’t be overlooked. Which is exactly why it’s time to view it through a different prism — or risk being left behind by your competitors who will.
Tags : 
mobility, mobile, hoteliers, guest experience, oracle
    
Oracle
Published By: NetApp     Published Date: Aug 26, 2016
In competitive business environments, speed is a key differentiator. IT organizations worldwide have realized significant value in transitioning from traditional disk to flash-based storage architectures, paving the path to making businesses more responsive and ultimately more competitive. Learn how to transform traditional IT with high-speed data delivery while reducing the costs and risks.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
    
Akamai Technologies
Published By: Vena Solutions     Published Date: Oct 29, 2018
Based on in-depth research and customer interviews, the annual Nucleus Research Value Matrix map out the corporate performance management (CPM) market landscape, evaluating vendors on a matrix contrasting usability and ease-of-use versus features and depth of functionality. Read or download the 2018 edition to uncover the most up-to-date CPM landscape, to find the best finance software solution for your needs, and to see why Vena led the pack in usability to land in the Leader quadrant for the third straight year.
Tags : 
nucleus research, cpm matrix, cpm technology value, cpm technology matrix 2018, excel replacement, financial planning, budgeting, forecasting
    
Vena Solutions
Published By: Dassault Systèmes     Published Date: Nov 11, 2019
"The term Value Network describes enterprises that truly connect into a network of partners that collaborate and communicate with lightning speed and agility. The supply chain is now overshadowed by interconnected Value Networks. One example for Value networks applications is the digital twin, where the physical environment is replicated in a virtual model to harmonize new product design, process design and manufacturing design with planning, logistics, service and execution. When the virtual world and real world truly work together, we are able to speed up decision-making, reduce risk and cost, deliver great customer experiences, and minimize waste to make businesses more sustainable. Dassault Systèmes DELMIA,powered by the 3DEXPERIENCE platform, delivers the solutions to industries and service providers to transform their operations and orchestrate their entire Value Network."
Tags : 
    
Dassault Systèmes
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee