All resources sponsored by:

RSA, The Security Division of EMC

1 - 25 of 83 Matches
The Need for a New Approach to Provisioning
sponsored by RSA, The Security Division of EMC
VIDEO:This video explains the crucial need to handle risk appropriately when dealing with access control.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014
Get This Now


The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO:This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014
Get This Now


Get Free GRC Resources and Connect with Peers
sponsored by RSA, The Security Division of EMC
RESOURCE:The RSA Archer GRC Community is an online network of GRC professionals who leverage the content and advice of RSA and its 11,000+ GRC members to help themselves and their organizations excel. Access white papers, blogs, webcasts and more.
Posted: 05 Sep 2014 | Published: 05 Sep 2014
Get This Now


Streamline Your Federal Contingency Planning/COOP
sponsored by RSA, The Security Division of EMC
WEBCAST:Learn how to streamline your COOP with an automated and integrated solution. Understand the nuances of the terminology and align with best practices such as NIST 800-34. Align recovery efforts with organizational objectives and priorities.
Posted: 05 Sep 2014 | Premiered: Sep 5, 2014
Get This Now


Keys to a Successful BCM Program
sponsored by RSA, The Security Division of EMC
WEBCAST:Watch to discover how a centralized, automated approach to business continuity and disaster recovery planning allows you to respond swiftly in a crisis to protect your operations with the RSA Archer Business Continuity Management solution.
Posted: 05 Sep 2014 | Premiered: Sep 4, 2014
Get This Now


Preventing Data Breaches with Data Access Governance
sponsored by RSA, The Security Division of EMC
VIDEO:Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014
Get This Now


Solutions with ROI for Today's Federal Information Assurance Challenges
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This paper illustrates the major challenges faced by today's Federal IA professionals, and offers solutions, along with ROI for each of those challenges.
Posted: 03 Sep 2014 | Published: 31 Dec 2013
Get This Now


Learn How to Successfully Manage a Continuous Monitoring Program
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This paper provides an introduction to Continuous Monitoring (CM), including definitions and common misperceptions. Learn how to successfully manage your own CM program.
Posted: 03 Sep 2014 | Published: 03 Sep 2014
Get This Now


Mobile Access to Your BC/DR Plans
sponsored by RSA, The Security Division of EMC
VIDEO:Watch to discover how the RSA Archer Business Continuity Management Mobile application enables users to view business-continuity or disaster-recovery plans and associated strategies, tasks, calling trees, and requirements from their Apple iOS device.
Posted: 03 Sep 2014 | Premiered: 03 Sep 2014
Get This Now


Internal Audit: Challenges and Solutions to Alignment
sponsored by RSA, The Security Division of EMC
WHITE PAPER:In this whitepaper, learn how Internal Audit (IA) can benefit from partnering with these organizational groups while maintaining a certain level of independence.
Posted: 02 Sep 2014 | Published: 01 Oct 2013
Get This Now


How Access Governance Makes Data Loss Prevention Successful
sponsored by RSA, The Security Division of EMC
WHITE PAPER:Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Posted: 02 Sep 2014 | Published: 02 Sep 2014
Get This Now


What's Different About Mobile Security? An Identity Driven Approach
sponsored by RSA, The Security Division of EMC
RESEARCH CONTENT:Market Conditioning piece on mobile.
Posted: 02 Sep 2014 | Published: 02 Sep 2014
Get This Now


Countering Cyber Threats with Behavioral Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014
Get This Now


Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER:In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014
Get This Now


Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Posted: 16 Apr 2014 | Published: 16 Apr 2014
Get This Now


Transforming Information Security: Designing State-of-the-Art Extended Team
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This informative whitepaper explores strategies for designing a state-of-the-art security team.
Posted: 29 May 2014 | Published: 31 Dec 2013
Get This Now


Transforming Information Security: Focusing on Strategic Technologies
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This in-depth guide outlines the current threat landscape and explores strategic technologies for your information security strategy.
Posted: 29 May 2014 | Published: 29 May 2014
Get This Now


RSA Security Operations Management (SecOps) in Action
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This informative resource explores a unique security solution that aims to simplify your security management while providing improved security.
Posted: 20 May 2014 | Published: 21 Mar 2014
Get This Now


Transforming Information Security: Future-Proofing Processes
sponsored by RSA, The Security Division of EMC
WHITE PAPER:Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
Posted: 17 Apr 2014 | Published: 31 Dec 2013
Get This Now


Cut through complexity: The key to IAM success
sponsored by RSA, The Security Division of EMC
ANALYST REPORT:This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: 17 Apr 2014 | Published: 31 Aug 2013
Get This Now


The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013
Get This Now


The Case for GRC: Addressing the Top 10 GRC Challenges
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offers industry-leading advice on how to make the best investments in each of these areas.
Posted: 16 Apr 2014 | Published: 31 Dec 2012
Get This Now


2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER:View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013
Get This Now


RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA, The Security Division of EMC
WHITE PAPER:This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014
Get This Now


Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER:These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013
Get This Now


1 - 25 of 83 Matches
Page: 2 3 4 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement