IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing RiskWhite Papers (View All Report Types)
 
How to tackle information classification
sponsored by ComputerWeekly.com
WHITE PAPER: The aim of this paper is to demonstrate how information classification can be used to enhance security within a Collaboration Oriented Architecture.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

Prepare Now and Save Later: Guide to Business Continuity and Disaster Recovery Implementation
sponsored by Veeam Software
WHITE PAPER: Take a look at this in-depth white paper to find out how this backup and replication solution helps organizations plan and implement a disaster recovery and business continuity that is capable of supporting their demanding data centers.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Veeam Software

Cisco Data Center Security Mitigates Risk When Transitioning to the Private Cloud
sponsored by Data#3
WHITE PAPER: Cloud computing is becoming a popular option in the IT evolution. It offers many benefits, but it also introduces new security risks and concerns. In order to gain a better understanding of the complex challenges of cloud computing, you should consult this resource and find out more information.
Posted: 29 Oct 2012 | Published: 29 Oct 2013

Data#3

Mastering Risk with Business Forecasting
sponsored by IBM
WHITE PAPER: The following white paper provides readers with an overview of the current state of risk management and introduces a 4-step program for incorporating risk into your business forecasting. Learn how by doing so you can mitigate any downside potential and exploit any upside potential inherent in a situation.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IBM

Security intelligence is the smart way to keep the cloud safe
sponsored by IBM
WHITE PAPER: This white paper will examine the intelligence capabilities necessary for gaining visibility into, and control over, cloud security. It also demonstrates how an integrated suite of end-to-end security intelligence solutions can help meet cloud security needs.
Posted: 25 Mar 2014 | Published: 31 Oct 2013

IBM

Securely Enable Online Business
sponsored by CA Technologies.
WHITE PAPER: Historically, security practices meant less productivity and growth for businesses, but it no longer has to be a trade-off. In order for organizations to effectively grow their business, protection and efficiency need to go hand in hand. Read this white paper to find out more about improving security without sacrificing productivity.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
Posted: 15 Jul 2011 | Published: 05 Jul 2011

GeoTrust, Inc.

SANS Institute: Oracle Database Security, What to Look for and Where to Secure
sponsored by Oracle Corporation
WHITE PAPER: To properly protect the information at the database layer there are a number of comprehensive measures that need to be taken. With this paper Tanya Baccum, SANS Institute analyst, examines these measures for holistically protecting Oracle database from inside out.
Posted: 08 Jun 2011 | Published: 08 Jun 2010

Oracle Corporation

Network Security Essential Guide
sponsored by SearchSecurity.com
WHITE PAPER: The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com

The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER: In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement