X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 risk identification


Software Selection Processes-Accelerating Vendor Identification
Software selection is complex and time-consuming. Taking shortcuts or skipping steps in the process increases the risk of making the wrong choice. But attending

risk identification  process are skipped, the risk of selecting a software package that doesn't live up to the expectations of management and the user community increase significantly. Many chief information officers (CIOs) have lost their jobs after a failed implementation. The vendor engagement process can take an exceptionally long time to execute, especially when more than a few vendors are being included in a selection study. However, it is possible to use the new technologies available to accelerate this process. About

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » risk identification

The Three Rs of RFID: Rewards, Risk, and ROI


Prominent organizations and retailers, such as Walmart and the US Department of Defense are taking advantage of radio frequency identification, which promises real time tracking of products from the manufacturing floor to the checkout terminal. Despite the typical risks associated with adopting any early-stage technology, the competitive advantage and bottom-line business benefits of RFID are significant to both retailers and suppliers. It can significantly decrease warehouse, distribution, and inventory costs; increase margins; and enhance customer service.

risk identification  Rs of RFID: Rewards, Risk, and ROI Introduction The promise of radio frequency identification (RFID) is every supply chain manager's dream—real time tracking of every single product, from manufacture to checkout. Compared to universal product code (UPC) bar coding, which RFID promises to replace, RFID proactively transmits information, eliminating the manual point-and-read operations needed with bar coding. This enhanced visibility could significantly decrease warehouse, distribution, and inventory Read More

Understanding and Managing Supply Chain Risk


As supply chains continue to grow in size and complexity, companies are focusing more of their energies on managing supply chain risk. While the topic is gaining prominence in boardrooms, many companies do not yet fully comprehend the risks they face. But understanding risk is the first step to managing it—and using the right IT tools can help. Learn what steps you can take to better address your supply chain risks.

risk identification  risk enterprise risk evaluation risk identification risk management risk management alternatives risk management analysis risk management assessment risk management association risk management basics risk management checklist risk management consultants risk management consulting risk management definition risk management derivatives risk management framework risk management guide risk management guidelines risk management in information technology risk management industry risk management information Read More

10 Keys to Managing Risk in Perilous Times


In the economist intelligence unit white paper managing risk in perilous times: practical steps to accelerate recovery, you'll find ten key recomme...

risk identification  Keys to Managing Risk in Perilous Times Risk management was hardly front page news—until last year, when financial markets around the world began to melt down. Now businesses in every industry are scrambling to find ways to address potential weaknesses in their risk identification, assessment, and management policies. In the Economist Intelligence Unit white paper Managing Risk in Perilous Times: Practical Steps to Accelerate Recovery , you'll find ten key recommendations for avoiding the risk Read More

A How-to Guide for a Radio Frequency Identification Site Survey


As organizations prepare for a radio frequency identification (RFID) implementation, they often don't understand the preliminary work necessary to begin the project. The importance of a site survey can influence the success or failure of an RFID project.

risk identification  documentation is lacking (for risk mitigation). After the survey is complete, a written document should be produced by the surveying company for the organization's records and for use as a guide for hardware quantities. This responsibility should rest upon the chosen business partner. The document should contain the results from the test, the recommended hardware, and most importantly, equipment placement. Further, documentation will eliminate any issues for hardware placement if the vendor and the Read More

Managing Risk in Enterprise Software Selection


Selecting and implementing new enterprise software changes your company, and the business processes that drive it. How you handle these changes can make the difference between implementation failure and success. Download this report to learn the steps to take--and the mistakes to avoid--to ensure a successful project outcome. You'll also learn why it's essential to deal with risk before the implementation phase--when it may be too late.

risk identification  Risk in Enterprise Software Selection Selecting and implementing new enterprise software changes your company, and the business processes that drive it. How you handle these changes can make the difference between implementation failure and success. Download this report to learn the steps to take--and the mistakes to avoid--to ensure a successful project outcome. You'll also learn why it's essential to deal with risk before the implementation phase--when it may be too late. Read More

The Convergence of Enterprise Governance, Risk & Compliance Software Solutions


The market for governance, risk, and compliance is still a maelstrom. Some vendors offer GRC software for the enterprise (eGRC), whereas others offer GRC for monitoring access and communications for compliance (IT-GRC). What’s more—both branches of GRC use technology to automate highly complex processes, while some GRC vendors offer capabilities that overlap both areas. To get a sense of the current attitudes toward GRC, Hypatia Research evaluated more than 20 GRC software vendors and interviewed more than 660 users of these applications. Read up on best practices, benchmarks, and vendor ranking.

risk identification  Convergence of Enterprise Governance, Risk & Compliance Software Solutions The market for governance, risk, and compliance is still a maelstrom. Some vendors offer GRC software for the enterprise (eGRC), whereas others offer GRC for monitoring access and communications for compliance (IT-GRC). What’s more—both branches of GRC use technology to automate highly complex processes, while some GRC vendors offer capabilities that overlap both areas. To get a sense of the current attitudes toward GRC, Read More

Coming to Grips with IT Risk


Some executives say the greatest risk to any large company is IT failure. IT applications routinely support critical processes throughout a business: customer service, invoicing, payroll, regulatory compliance, and more. With so much depending on IT, any disruption can be ruinous. But amazingly, many companies don’t have sound IT risk management processes in place. Find out how investing in IT reduces your security risk.

risk identification  to Grips with IT Risk Some executives say the greatest risk to any large company is IT failure. IT applications routinely support critical processes throughout a business: customer service, invoicing, payroll, regulatory compliance, and more. With so much depending on IT, any disruption can be ruinous. But amazingly, many companies don’t have sound IT risk management processes in place. Find out how investing in IT reduces your security risk. Read More

Risk in Content Management Implementations: Examining Software Services


Every decision you make factors some kind of risk. When making the decision to implement a content management system (CMS), it’s important to be aware of all possible potential risks—and how to prepare for them. How high is your risk of data loss? What can you do to mitigate the risk of security breach? And which is riskier for your company, a hosted or an installed CMS? Learn more about these and other risks.

risk identification  How high is your risk of data loss? What can you do to mitigate the risk of security breach? And which is riskier for your company, a hosted or an installed CMS? Learn more about these and other risks. Read More

SAP Upgrades: Mitigating Risk to Maximize Value


The risks of enterprise resource planning (ERP) upgrades are clear. However, progress has been made, and this is especially true for SAP customers migrating to ECC 5.0. But what are the risks associated with SAP upgrades? And what are specific risk-mitigation approaches? SAP’s ASAP upgrade methodology can help answer these questions to maximize the value of an upgrade investment.

risk identification  Upgrades: Mitigating Risk to Maximize Value The risks of enterprise resource planning (ERP) upgrades are clear. However, progress has been made, and this is especially true for SAP customers migrating to ECC 5.0. But what are the risks associated with SAP upgrades? And what are specific risk-mitigation approaches? SAP’s ASAP upgrade methodology can help answer these questions to maximize the value of an upgrade investment. Read More

Enhanced Courseware for Compliance and Risk Mitigation Training from Skillsoft


Skillsoft announced that it has added new content courses to its compliance and risk mitigation courseware collection. Skillsoft's compliance courses—available on demand—are aimed at preparing individuals for exams and meeting regulatory requirements. The courses have been compiled in collaboration with subject matter experts and cover organization-specific legal requirements as well

risk identification  Courseware for Compliance and Risk Mitigation Training from Skillsoft Skillsoft announced that it  has added new content courses  to its compliance and risk mitigation courseware collection. Skillsoft's compliance courses—available on demand—are aimed at preparing individuals for exams and meeting regulatory requirements. The courses have been compiled in collaboration with subject matter experts and cover organization-specific legal requirements as well as ethics, bribery, harassment, wages, Read More

Deploying a Zero-risk Intrusion Prevention System


The availability of your server and key business applications depends on how you deal with security vulnerabilities. Intrusion prevention systems (IPSs) go some distance toward protecting databases and networks from hacking. But it’s not enough. Discover the benefits of a next-generation IPS that generates no false positives and can be deployed with zero risk to instantly protect your data from potential security threats.

risk identification  be deployed with zero risk to instantly protect your data from potential security threats. Read More

How a Leading Vendor Embraces Governance, Risk Management, and Compliance


SAP AG has long committed to placing compliance at the core of its product suite, as the vendor has recognized the growing role of enterprise systems in assisting companies to meet the increasing challenges of corporate compliance and risk management.

risk identification  Leading Vendor Embraces Governance, Risk Management, and Compliance Rather than complying with the growing number of legal and regulatory requirements in a reactive manner from the bottom up, more and more, enterprises are realizing the value of taking a holistic approach to regulatory compliance from top down. To that end, enterprises are beginning to harness the emerging strategic software category of governance, risk management, and compliance (GRC). This new three letter acronym (TLA) has already Read More

Managing Risk through Better Planning


There are many business pressures urging organizations to improve their planning processes. However, in many organizations, the achievement of delivering the annual plan is so onerous that little business benefit is derived from it. That’s why organizations should look for a planning solution capable of delivering flexible business models—models which are mapped to their unique business requirements.

risk identification  Risk through Better Planning There are many business pressures urging organizations to improve their planning processes. However, in many organizations, the achievement of delivering the annual plan is so onerous that little business benefit is derived from it. That’s why organizations should look for a planning solution capable of delivering flexible business models—models which are mapped to their unique business requirements. Read More

Ascending the Maturity Curve: Effective Management of Enterprise Risk and Compliance


The governance, risk, and compliance (GRC) concept remains as relevant as ever. In addition to the traditional goal of meeting compliance obligations, companies today see the investment in risk and compliance management as a means of aligning their risk and controls with broader strategic goals, building better relationships with stakeholders, and enhancing overall performance. Read this white paper for survey finding and interviews that suggest several action points.

risk identification  Effective Management of Enterprise Risk and Compliance The governance, risk, and compliance (GRC) concept remains as relevant as ever. In addition to the traditional goal of meeting compliance obligations, companies today see the investment in risk and compliance management as a means of aligning their risk and controls with broader strategic goals, building better relationships with stakeholders, and enhancing overall performance. Read this white paper for survey finding and interviews that suggest Read More