Business of Information Technology  >   Business Management  >   Risk Management  >  

Business Insurance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Insurance
DEFINITION: A policy that provides coverage to a business.
Business InsuranceWhite Papers (View All Report Types)
26 - 50 of 1204 Matches Previous Page  | Next Page
3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett-Packard Company

4 Tips to Fire Up Productivity
sponsored by North Sydney IT and Cisco
WHITE PAPER: Read this list of four tips that can help you capitalize on new revenue opportunities so you can grow your business.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

North Sydney IT and Cisco

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

6 Ways Solid Information Management Can Keep You Compliant
sponsored by Iron Mountain
WHITE PAPER: Access this resource to learn methods and best practices for information management that IT leaders can implement to improve efficiency, compliance and cost savings, including six steps to greater compliance.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

Iron Mountain

8 Simple Steps to Bring Shadow IT into the Light
sponsored by Rackspace
WHITE PAPER: This in-depth white paper outlines the 8 essential steps for IT professionals to drag Shadow IT into the light and regain control of their organization.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Rackspace

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 14 Jan 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

8 Ways to Minimize Risk Exposure and Contain Litigation Costs
sponsored by Iron Mountain
WHITE PAPER: An effective response to litigation requests is pivotal in today's corporate world. Many organizations are struggling to balance litigation-related expenses and organizational risk. This white paper can help. Read this now and gain eight best practice tips for containing the cost of litigation preparation and response while reducing your risk.
Posted: 15 Mar 2012 | Published: 14 Mar 2012

Iron Mountain

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

3 Strategies to Protect Endpoints from Risky Applications
sponsored by Lumension
WHITE PAPER: Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Lumension

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

6 Mistakes Companies Make and How to Avoid Them
sponsored by SAP America, Inc.
WHITE PAPER: This paper highlights common mistakes companies make in a down economy and discusses how organizations can use business intelligence to avoid them. Use the self-assessment questionnaire at the end of this paper to determine the level of business intelligence opportunity across your organization.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

SAP America, Inc.

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

7 Basic Principles for Archiving Siebel Application Data
sponsored by Princeton Softech
WHITE PAPER: Enterprise data management strategies that include archiving provide a full-lifecycle approach for managing Siebel data. Learn how archiving can improve customer relationship management (CRM) performance and cost control while minimizing risk.
Posted: 20 Jun 2007 | Published: 01 Jan 2007

Princeton Softech

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

7 Key Reasons to Implement an Identity Aware Network
sponsored by Applied Identity
WHITE PAPER: This paper provides you with insight into the seven key reasons why internal networks are migrating towards an identity and role based infrastructure to provide a more effective and cost efficient method for securing critical business assets.
Posted: 26 Mar 2008 | Published: 01 Mar 2008

Applied Identity

7 Steps to Building a Business Case for ERP
sponsored by Sage Software
WHITE PAPER: Businesses are looking to make technology investments to prepare for growth but remain cautious with the economic recovery uncertain. Businesses need to define a business case for their technology investments and build a framework to measure ROI. This paper describes a 7-step process that will help build the business case for an ERP investment.
Posted: 09 Feb 2011 | Published: 09 Feb 2011

Sage Software

9 Common Mistakes to Avoid When Selecting and Deploying a mobile Solution
sponsored by ClickSoftware
WHITE PAPER: This resource outlines nine common mistakes that are often made when deploying and managing a mobile initiative. Inside, find key recommendations that will help you sidestep these concerns and realize mobile success.
Posted: 04 Apr 2013 | Published: 31 Dec 2012

ClickSoftware

A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

A Best Practice Guide to Family Office Technology
sponsored by Advent Software, Inc
WHITE PAPER: Packed with practical tips and actionable guidance, this 16-page report covers all of the key technology systems that family offices need to evaluate—along with the pros and cons of each and tradeoffs to consider. It’s a must-read for any family office looking to build competitive advantage in today’s environment.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Advent Software, Inc

A Complete View Of The Enterprise: Linking Operational And Financial Planning In Global Organizations
sponsored by SAP America, Inc.
WHITE PAPER: In February 2008, CFO Research Services, a unit of CFO Publishing and part of The Economist Group, began a research project with Business Objects, an SAP company, asking senior finance executives to give views on their priorities and challenges around integrating operational and financial planning processes.
Posted: 05 Jun 2009 | Published: 01 May 2008

SAP America, Inc.

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER: This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007

IBM

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric
26 - 50 of 1204 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement