Business of Information Technology  >   Business Management  >   Risk Management  >  

Business Insurance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Insurance
DEFINITION: A policy that provides coverage to a business.
Business Insurance White Papers (View All Report Types)
151 - 175 of 1166 Matches Previous Page  |  Next Page
Banish Bad Bots By Asking These 13 Questions
sponsored by Distil Networks
WHITE PAPER: With bots being such a hot topic in web security, vendors are claiming they have the ability to effectively identify and mitigate bots. Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

Best Practices for Dealing With Phishing and Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Discover how dire an issue phishing and ransomware has become, and learn how to mitigate them effectively. Through vulnerability analysis, threat intelligence, good backup processes and, most importantly, common sense, you can reduce your organization's risk of infection down to zero percent.
Posted: 12 Oct 2016 | Published: 01 Sep 2016

Barracuda Networks

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute

Best Practices for Ransomware Detection and Remediation
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Best Practices to Scale Your UBI Program: Avoiding the Top 7 Telematics Connectivity Mistakes
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to properly scale your IoT connected business through greater device management and connectivity. Gain a deeper understanding of your organization through the IoT and telematics-based services, and discover seven mistakes in telematics to avoid.
Posted: 03 Jan 2017 | Published: 31 Dec 2014

Cisco Systems, Inc.

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: Cyberattacks are likely to increase in the coming years and by better understanding key indicators of vulnerability to breaches, executives and directors can begin to effectively mitigate the risk of a data breach. Discover the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Balancing Risk and Innovation with Sourcing Alternatives: Helping IT managers and CIOs raise the ROI of IT
sponsored by IBM
WHITE PAPER: This paper explains how clients can balance risk and innovation through the use of services from IBM.
Posted: 20 May 2011 | Published: 01 Dec 2010

IBM

Balancing Security and Usability of Mobile Devices
sponsored by BlackBerry
WHITE PAPER: This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett Packard Enterprise

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Website Security Solutions
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Website Security Solutions

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

Best Practices in Creating a Strategic Finance Function
sponsored by SAP America, Inc.
WHITE PAPER: the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

Best Practices in Data Management
sponsored by SAS
WHITE PAPER: The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM.
Posted: 06 Mar 2008 | Published: 01 Jan 2007

SAS

Best Practices in Securing Your Customer Data in Salesforce, Force.com, and Chatter
sponsored by CipherCloud
WHITE PAPER: Many organizations want to move to the Salesforce platform, but concerns about data security, privacy, residency, and compliance have held them back. This whitepaper outlines best practices in securing sensitive customer data in Salesforce and outlines "must have" capabilities to overcome emerging cloud threats.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

CipherCloud

Best Practices White Paper: Implementing Process Modeling from Scratch - Untying the Gordian Knot
sponsored by EMC Corporation
WHITE PAPER: The complexity of operational processes can be a significant obstacle to any effort for improvement through modeling and analysis. Access this white paper for 3 principles that can be used to simplify management strategies and arrive at models that will provide you with a better understanding of your business.
Posted: 09 May 2011 | Published: 09 May 2011

EMC Corporation

Best Practices: Five ways learning managers can make a strategic contribution
sponsored by SuccessFactors
WHITE PAPER: This brief resource examines current challenges with talent acquisition and counts down five best practices to help HR leaders address the skills gap by developing internal talent.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

SuccessFactors

Better Healthcare Starts with Better Information
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines Dell's holistic solutions, bringing together implementation services, process improvement consulting and customized IT technology so caregivers have better information for better patient care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

Beyond Disaster Recovery: Becoming a Resilient Business
sponsored by IBM
WHITE PAPER: In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure's response and test overall resiliency.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

Beyond Disaster Recovery: Becoming a Resilient Business Organization
sponsored by IBM Software Group
WHITE PAPER: Discover how to combine several risk management strategies into a single integrated one, making your infrastructure able to respond to the threat of disaster.
Posted: 05 Dec 2007 | Published: 01 Jan 2007

IBM Software Group

Beyond Government Incentives: Return on Investment in EHRs
sponsored by HP & Intel®
WHITE PAPER: Meaningful use is only the beginning:  Efficiency and more appropriate coding bring savings and increase revenues. This white paper discusses features and benefits of an EHR system, government incentives, sources for ROI as well as building the business case for EHR.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®
151 - 175 of 1166 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement