Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk AnalysisWhite Papers (View All Report Types)
 
Continuous Monitoring for Data Access and Sensitive Information
sponsored by IBM
WHITE PAPER: This white paper highlights a simple, robust solution that assures the security and integrity of data in several environments, such as big data platforms.
Posted: 07 Oct 2014 | Published: 31 Oct 2013

IBM

Why eDiscovery Should be a Top Priority for Your Organization
sponsored by Hewlett-Packard Company
WHITE PAPER: E-discovery rules and requirements continue to evolve and are placing additional demands on IT pros. Find out why in this report by Osterman Research.
Posted: 21 Sep 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

How Information Governance Helps You Meet Corporate Responsibilities
sponsored by Hewlett-Packard Company
WHITE PAPER: What is information governance? How can you make it work for you? Find out in this report by Kahn Consulting, and learn how to address its challenges.
Posted: 21 Sep 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Mitigating Security Risks at the Network's Edge: Best Practices for Distributed Enterprises
sponsored by CradlePoint
WHITE PAPER: Access this white paper to discover the keys to preventing data breaches in distributed enterprises.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

CradlePoint

Vendor Landscape: Intrusion Detection & Prevention Systems
sponsored by IBM
WHITE PAPER: Check out this helpful resource to get an inside evaluation of today's IDPS vendors and products, and uncover which are the best fit for your enterprise needs.
Posted: 12 Sep 2014 | Published: 31 Dec 2012

IBM

DLP’s Three Lock Box
sponsored by CDW Corporation
WHITE PAPER: This white paper examines what data loss prevention (DLP) solutions entail, how to select them, and what DLP can do for your organization.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

Security in the New Mobile Ecosystem – A Ponemon Institute Study
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This study takes a look at over 600 IT security professionals who are highly involved in their organizations' mobile and enterprise security activities, and explains the current security status of mobile devices in the workplace.
Posted: 01 Oct 2014 | Published: 31 Aug 2014

Raytheon Trusted Computer Solutions

Managed Security Services: When It's Time to Stop Going "It" Alone
sponsored by NEC Corporation of America
WHITE PAPER: Even if an organization is capable of the traditional, DIY integration of on-promise security solutions using in-house resources, is it truly any better than leveraging the expertise, scale and scope of a third-party service provider?
Posted: 15 Oct 2014 | Published: 15 Oct 2014

NEC Corporation of America
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement