Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk AnalysisWhite Papers (View All Report Types)
 
Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.
Posted: 29 Oct 2014 | Published: 18 Oct 2012

EMC Corporation

Information Management: A new game plan for building a retention strategey that works
sponsored by IBM
WHITE PAPER: Consult the following white paper to uncover the steps and focal points you need to take and pay attention to in order to build a record retention strategy that works in today's data-driven environment.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

IBM

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Tame Mobile and Cloud Security Risks by Becoming an IdP
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

DDoS Mitigation Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores five best practices for distributed denial of service attack mitigation.
Posted: 29 Oct 2014 | Published: 17 Oct 2012

Verisign, Inc.

Five Must-Haves for Enterprise File Sync and Share Flexibility
sponsored by Code42
WHITE PAPER: This is why it's vital to have an enterprise-grade sync and share solution in place, but what constitutes enterprise grade? Read this whitepaper for five must-haves for enterprise sync and share flexibility.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Finding the Right Security Assessment Approach for Your Organization
sponsored by Dell SecureWorks
WHITE PAPER: Download this exclusive whitepaper to determine how you should be assessing your security and explore test options.
Posted: 19 Nov 2014 | Published: 13 Nov 2013

Dell SecureWorks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement