REGISTER

email 14 48

dmlogo

Datamonitor, July 2007, Pages: 8

This brief analyses the strengths and weaknesses of RSAs enterprise security offering. RSA is rated according to its market impact (based on revenues), user sentiment (based on customer perceptions) and technology.

Scope of this title:

Technology: an assessment of RSAs technology based on specific attributes and the availability of certain features. User sentiment: tracks end-users impression of RSAs products based on a survey of over 300 enterprise security users. Market impact: measures RSAs market impact based on its revenues and financial performance.

cutter

Cutter Consortium

Enterprise Risk Management & Governance (ERM&G) Advisory Service focuses on helping organizations assess their total risk spectrum and manage it as a whole. The top-level, critical, and objective advice you'll receive as a client will help your organization implement sound risk management and governance strategies that allow for innovation and profitability, even under the increasing pressures of compliance.

dmlogo

Datamonitor, May 2009, Pages: 17

This report will look at the challenges faced, and the strategies adopted in integrating risk disciplines across a fast growing organization across multiple geographies.

dmlogo

Datamonitor, Jan 2008, Pages: 15

A successful enterprise risk management (ERM) strategy can help organizations meet the challenges posed by emerging technologies by providing a framework for managers to consider how risk exposures are changing, determine the amount of risk they are willing to accept and ensure they have the appropriate risk mitigants in place to limit risk to targeted levels

dmlogo

Datamonitor, Jan 2008, Pages: 14

Overview & analysis of how financial institutions are seeking realise the benefits of enterprise risk management solutions in order to further align technology with business strategy.

John Wiley and Sons Ltd, Oct 2007, Pages: 360

Much of project management writing addresses only the basics of time, cost, and scope management (or people and organizational issues) and fails to address the day-to-day nuances that become so important in practice. The reality is that there is far more than this to managing projects successfully.

javelin

Javelin Strategy & Research, Nov 2007, Pages: 26

Safeguarding customer data is a necessary component of good business practice, yet the numbers of data breached accounts are at an all time high. Data security has not been given front line priority, and as a consequence an environment of mistrust of the card eco-system has developed among consumers, merchants, acquirers, and issuing banks. To stem this tide, the payment networks have responded with a renewed emphasis, harsher penalties, and more specific deadlines for Payment Card Industry Data Security Standards (PCI DDS) compliance.

javelin

Javelin Strategy & Research, March 2007, Pages: 35

In light of the TJX saga, issuers will no longer passively accept the costs incurred from lost cardholder data that is no fault of their own. Merchants, on the other hand, view PCI compliance as costly and burdensome, and of little value beyond "compliance". Rather than point fingers and assess blame, all industry participants must understand the necessary steps to secure cardholder data efficiently and cost effectively.

John Wiley and Sons Ltd, April 2007, Pages: 96

Quick and easy implementation and maintenance guide for ongoing Sarbanes-Oxley compliance

For most companies, achieving compliance to the Sarbanes-Oxley Act (SOX) has proven to be more challenging, and more costly, than initially anticipated. In many cases, initial and second-year compliance efforts were found to have strained company resources, causing a shift of focus away from such areas as internal audit in order to meet SOX requirements.

Butler Group

Butler Group, June 2006, Pages: 360

Identity and Access Management (I&AM) is supported by a range of widely used and reasonably mature protection technologies, that when deployed correctly, enable organisations to operate efficiently in today's competitive and often difficult trading environments. The efficient management of identity and associated access control issues needs to be of pressing concern for all security-conscious organisations, irrespective of their size or business focus.

Data Monitor

Datamonitor, Nov 2008

This interactive model offers a comprehensive view of revenue opportunities in the global market for identity & access management products and services across key verticals and geographies. The model includes the revenue opportunities in a wide range of identity & access management products and their associated services, as well as product-independent services such as managed services.

dmlogo

Datamonitor, Sep 2008, Pages: 49

Business process management has been a feature of the technology market for the last three decades. Today, BPM is more relevant than ever. The global business environment is increasingly dynamic, pushing organizations to evaluate technologies that can help them respond to business challenges. By adopting BPM, enterprises can boost their ability to derive a palpable competitive advantage.

top_titlebar_logo

Butler Group, June 2008, Pages: 324

CATALYST
Many early Document and Records Management (DRM) deployments were rolled out at the departmental level as point solutions to address a single issue. Now these organisations are extending their deployments enterprisewide to address compliance requirements or to deliver an integrated information management strategy.

wintergreen

WinterGreen Research, Inc., Jan 2008, Pages: 728

This research announces that it has a new study on enterprise content management markets. Systems are poised for significant growth as people move to purchase for new marketing and Web based applications based on XML and Web technologies.

Enterprise content management (ECM) systems are basic infrastructure for unstructured information. Unstructured information is becoming more structured as it is tagged with XML tags and managed in components enabling reuse and repurposing of content.

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

Go to top