IT Showcase \\ risk management Software Providers and Solutions
Excerpt for risk management: Enj is an enterprise class business process management
(BPM) software product, which enables customers to define business processes and
automate transactions, documents, flows, and other actions required with every
day business processes.
Excerpt for risk management: A modular system, the first level of MISys Manufacturing provides the
basic functionality common to all manufacturing firms' needs. Additional
MISys modules include serial/lot tracking, bin tracking, manufacturing orders,
master production scheduling (MPS), material requirements planning (...)
Documents » risk management.
The growing number of legal and regulatory requirements associated with global trading is one of many reasons enterprises are looking into global trade management
applications, and into harnessing the up-and-coming, strategic software category of governance, risk management
, and compliance. PubDate: 3/7/2007
Abstract: Formalized risk management is underused in project management, where the focus is typically on schedule and budget. This affects most aspects of a project, including evaluation, selection, planning, execution, and control. How many project decisions are made without formally evaluating the potential consequences? When budgets are tight and competition is fierce, this question is more relevant than ever.
Abstract: As financial institutions look to the future, there’s bound to be a careful reappraisal of the role and responsibilities of risk management. Were the tools available to risk managers fit for purpose? Was the approach to risk management appropriate? Examine lessons that have been learned from the current financial crisis, and get 10 tips to help you address weaknesses in risk identification, assessment, and management.
Abstract: With a vast global network that supports over 60,000 employees, vulnerability and risk management programs are crucial for Oracle GIT. To further enhance its IT system risk management capabilities, Oracle deployed QualysGuard’s on-demand software vulnerability and compliance management solution. Since its deployment, Oracle has optimized its scanning capabilities and automated its demand security auditing processes.
Abstract: The right balance of automated processes with paper records and manual, human interaction is necessary to keep costs under control with a flexible yet controlled set of procedures. The strategic software category, governance, risk management, and compliance, is poised to help.
Abstract: SAP's governance, risk management, and compliance roadmap is still in its beginning stages. Only time will prove the vendor's delivery of true, tangible products (and not vaporware), as well as the success of those products with current and prospective customers.
Abstract: SAP AG has long committed to placing compliance at the core of its product suite, as the vendor has recognized the growing role of enterprise systems in assisting companies to meet the increasing challenges of corporate compliance and risk management.
Abstract: A broader, more structured approach is needed to effectively manage governance, risk management, and compliance (GRC). Enterprises will then be better able to guide their people, standardize their processes, and unify technology to embed GRC at all organizational levels.
Abstract: Enterprise e-mail solutions are vital to successfully doing business. However, they’re also increasingly expensive and complex, and e-mail servers are regularly subject to malicious attacks and other issues. Successful risk management begins by creating a policy for the entire messaging infrastructure. Learn how to build on that foundation to mitigate risk, so your organization is free to focus on growth and innovation.
Abstract: Because of new compliance and regulation, HealthSouth Corporation, one of the US largest providers of health care services, needed a comprehensive view of its security risks, automated reporting on compliance to ensure published security standards, and to prioritize the remediation of critical risks. Through Preventsys Security Risk Management System, HealthSouth was able to audit it facilities remotely, and reduce overhead costs.
Abstract: For most businesses, the subject of regulatory compliance and risk management usually evokes feelings of fear, uncertainty, and doubt. But it doesn’t have to. By taking the right approach, you can turn risk management and compliance into a proactive process that will put your business at the forefront of your market and set you apart from your competitors.
Abstract: Client processes and risk control contextualization can be greatly improved through investigation process design, process execution, and file management issues. Learn how BPS Server uses process templating concepts, separates fact management activities, and uses COSO centric mechanisms to accomplish this. This the second part to Risk, Risk Mitigation, and Functional Requirements in Dynamic Compliance Environments. This is part two of a two part white paper. Part One Risk Mitigation and Functional Requirements in Dynamic Compliance Environments.
Abstract: Banks face many challenges in today’s dynamic financial services marketplace. Banks must continuously enhance capabilities for risk and financial management to address market, credit, and regulatory environments that are increasingly complex. Thus, process support for your business strategies is crucial—which is why integrated tools are a must-have for financial accounting, cost controlling, risk management, asset-liability management, and profitability analysis.
Abstract: Physical asset management contributes greatly to the achievement of competitive advantages in capital intensive companies. Particularly in the areas of productivity, quality, cost effectiveness, and risk management. If your company has a need to manage physical assets it can benefit from a proven Total EAM solution provided by one of the top-level systems vendors.
Abstract: Organizations are overwhelmed with how to begin implementing identity and access management (IAM) solutions. They are scratching their heads and asking, 'Where do I start?' Even after implementation, security and information protection must be continually improved while ensuring compliance with regulations. Auditors continue to ask: 'Are the right controls in place?' 'Are they effective?' Download this white paper to learn more about defining the steps necessary to understanding and deploying IAM, giving enterprises a roadmap to an effective IAM program.
Abstract: The current focus in operational risk management is on enterprise-wide data capture across loss events, key risk indicators and self-assessments, with follow-up actions based on triggers. A system should satisfy regulatory requirements, such as Basel II and the US Sarbanes Oxley Act, and be built in a manner that minimizes the impact of changing business management functionality.
Abstract: An overview for CIOs of the provision and management of IT services at a level that addresses the risk management issues raised by the Basel Committee's New Capital Accord expected to become effective during 2006. Because of the dependence financial institutions have on IT services, the accord requires adequate provision to assure the availability of these services. Centauri Business Service Manager is presented as the solution: one that allows a CIO to assess current risk levels, measure ongoing risk and support a process of ongoing improvement to reduce this risk. Furthermore, Centauri provides the financial institution with a cost-effective balanced scorecard to improve decision-making.
Abstract: To keep your IT infrastructure healthy, strong operational processes are essential to managing changes—both planned and unexpected. A streamlined, integrated approach that incorporates hardware and software assets is a key foundation for meeting regulatory compliance requirements. Find out how you can benefit from applications that enable continuous compliance with operational processes and tools—and reduce your business risk.
Abstract: Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk assessments that mitigate risk by applying security risk management policies designed to protect a company’s data.