IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing Risk White Papers (View All Report Types)
 
Fraud risk engines strike back
sponsored by IBM
WHITE PAPER: Discover how to approach fraud detection in a new way. You must base your stance on three core principles —visibility, a global threat intelligence network, and agility by design. By using this approach, you can significantly reduce the number of false positives and can improve customer satisfaction.
Posted: 10 Jun 2016 | Published: 01 Feb 2016

IBM

The Breach Detection Gap and Strategies to Close It
sponsored by Infocyte
WHITE PAPER: What's needed is a layered approach to breach discovery that includes looking for threats which have slipped past the perimeter. Discover how to catch what prevention technologies miss. Reduce the breach detection gap and learn now to mitigate the possible damage caused by prolonged unauthorized access.
Posted: 15 Jun 2016 | Published: 01 May 2016

Infocyte

SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Most Effective Security Technologies and Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how understanding the business of hacking and how cybercriminals profit can help you develop a successful security strategy.
Posted: 13 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Management of Native Encryption for Apple FileVault and Microsoft BitLocker
sponsored by Intel Security
WHITE PAPER: With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack. This resource can help ensure you don't end up on the data breach victim's list.
Posted: 25 May 2016 | Published: 01 Apr 2016

Intel Security

The Threats From Within
sponsored by Kaspersky Lab
WHITE PAPER: With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.
Posted: 25 May 2016 | Published: 25 May 2016

Kaspersky Lab

Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale
sponsored by Anomali
WHITE PAPER: To address growing scalability issues, organizations will need to embrace a distributed computing approach to security. In addition, Threat Intelligence Platforms will need to create organizational relevance for threat intelligence data.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Anomali

Mobile Application Security Report 2016
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover just how much of your data is being collected and to what extent applications can access your data. Learn precautionary steps you can take to make sure applications aren't grabbing data you don't want them to and make responsible choices when downloading apps.
Posted: 16 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

IBM Security Trusteer Fraud Protection Suite solution brief
sponsored by IBM
WHITE PAPER: Discover more accurate fraud detection and gain greater visibility and adaptability across the fraud management lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

FINRA Regulat ions Requi re TechnologyInnovat ion to Address Supervision andMoni tor ing Workload
sponsored by Proofpoint, Inc.
WHITE PAPER: Business leaders need to find a healthy balance between flexible business solutions and data monitoring abilities. Learn how to protect and govern your sensitive information to help mitigate risk and, in the process, better comply with regulatory requirements.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement