IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing Risk White Papers (View All Report Types)
 
Harness Operational Risk with Enterprise GRC
sponsored by RSA
WHITE PAPER: This white paper examines the four key requirements to building an effective operation risk management program. View now to learn how to understand risk across the enterprise and analyze risk across silos. Read on to learn more.
Posted: 11 May 2015 | Published: 31 Dec 2014

RSA

How can Cisco cloud security accelerate cloud adoption?
sponsored by Cisco Systems, Inc.
WHITE PAPER: Cloud computing is quickly becoming a popular solution for customers. Consult this study to learn more about why security is one of the top barriers in regards to cloud computing. Uncover some of the risks and concerns you can face by implementing cloud computing in your enterprise.
Posted: 17 Oct 2012 | Published: 17 Oct 2012

Cisco Systems, Inc.

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

Business Transformation: Exploring the Requirements of a Strategic Business Transformation
sponsored by Hewlett-Packard Limited
WHITE PAPER: To keep up with market demands and trends, it is important for organizations to transform their business. This guide explores business transformation and how it reduces risk and cost
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Hewlett-Packard Limited

EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
sponsored by IBM
WHITE PAPER: Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
Posted: 06 Dec 2013 | Published: 03 Jul 2013

IBM

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

Strategy guide to business protection for hospitals
sponsored by HP and Intel® Xeon® processors
WHITE PAPER: This white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how you can avoid unplanned downtime, ensuring compliance and the highest quality of patient care.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP and Intel® Xeon® processors

Network Security Essential Guide
sponsored by SearchSecurity.com
WHITE PAPER: The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com

Symantec Internet Security Threat Report: Trends for 2011
sponsored by Symantec Corporation
WHITE PAPER: This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Posted: 25 May 2012 | Published: 30 Apr 2012

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement