Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis White Papers (View All Report Types)
 
Anti-Exploit Tools: The Next Wave of Enterprise Security
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them.
Posted: 01 May 2015 | Published: 01 May 2015


Azure Active Directory Solutions for Identity and Access Management
sponsored by Microsoft
WHITE PAPER: In this white paper, discover several common scenarios and understand how Azure™ Active Directory® (Azure AD) provides a comprehensive solution that addresses identity and access management requirements for on-premises and cloud applications, including Office 365 and a world of non-Microsoft SaaS applications.
Posted: 30 Apr 2015 | Published: 01 Feb 2014

Microsoft

Holistic Protection against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: This white paper discusses how you can design security customized for your network and for fighting off potential targeted attacks.
Posted: 07 May 2015 | Published: 31 Oct 2014

Trend Micro

On the Front Lines: How IT Can Manage Real-Time Risks
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper to learn the basics of managing risk in your enterprise. While a challenge, this resource explains why analytics and data management consultants are your main line of defense that allow you to detect threats.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Managing Emerging Database Technologies the Right Way
sponsored by Oracle Corporation
WHITE PAPER: Modern enterprises are eager to try new technology to gain a competitive edge and increase profitability. This leads to an increase in performance management challenges for database administrators. This white paper describes the latest from Oracle, Oracle Database 12c. Read on to learn how it addresses manageability challenges.
Posted: 29 Apr 2015 | Published: 30 Jun 2014

Oracle Corporation

What's Your Next Security Move?
sponsored by FireEye
WHITE PAPER: This quick self-assessment will help you navigate to your next big security decision and create better protection against advanced attackers.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

FireEye

Next Generation Security for Virtualized Datacenters
sponsored by BitDefender
WHITE PAPER: In this white paper, discover what a virtual environment needs in order to maintain its security.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

BitDefender

Addressing Compliance Issues Around Public Cloud for Content Collaboration with Box for Financial Services
sponsored by Box
WHITE PAPER: This white paper explores how content collaboration with Box for Finanical Services addresses compliance issues. Read now to learn how providing enterprise-class content collaboration capabilities can tackle compliance risk.
Posted: 20 May 2015 | Published: 20 May 2015

Box

Cybersecurity Strategies for the Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper examines the steps and technologies security managers for small- to mid-size organizations can leverage at each stage of an attack - before, during and after - in order to effectively secure endpoints and crucial data effectively.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Cisco Systems, Inc.

Research Reveals How Twelve MSS Options Perform
sponsored by IBM
WHITE PAPER: In this research report, discover how twelve MSS vendors measured up when tested.
Posted: 21 Apr 2015 | Published: 26 Feb 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement