Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis White Papers (View All Report Types)
Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper for in-depth reviews of some of the top SIEM vendors and to determine is SIEM is the right choice for you.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.

The Art of Cyber War: A Modern Defense Strategy
sponsored by Imprivata
WHITE PAPER: In this white paper, you'll find indispensible tips on maintaining security and winning the battle against cybercrime.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Protective Monitoring and the UK Public Services Network
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper addresses the specific security concerns of government organizations and discusses why protective monitoring is essential for keeping your citizens safe.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

LogRhythm, Inc.

Internal Segmentation Firewall: Protecting Your Network from the Inside Out
sponsored by Fortinet, Inc.
WHITE PAPER: In this brief white paper, you will discover if an internal segmentation firewall is the best form of protection for your users and applications. Learn how to enforce more granular security with policy-based segmentation, and contain threats by user, device, and application.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Fortinet, Inc.

When Minutes Count:How to Fight Advanced Threats with Real-Time SIEM
sponsored by Intel Security
WHITE PAPER: This report assesses organizations' abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and examines best practices for proactive incident response, including use of real-time SIEM solutions.
Posted: 22 Oct 2015 | Published: 31 Dec 2014

Intel Security

Breaches on the Rise in Control Systems: A SANS Survey
sponsored by Qualys
WHITE PAPER: This report contains the results of a survey that reveals how vulnerable most industrial control systems are and what you can do to ensure that yours isn't.
Posted: 16 Oct 2015 | Published: 30 Apr 2014


From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

Case Study: Sharing Files without Compromising Security
sponsored by FinalCode
WHITE PAPER: In this case study, discover how an electrical service organization obtained quick and easy file-sharing that didn't compromise its security.
Posted: 05 Oct 2015 | Published: 30 Apr 2015


Practical Threat Management for Healthcare Organizations
sponsored by AlienVault
WHITE PAPER: This white paper can help you overcome some of the many hurdles that healthcare security faces. Read on to keep your compliance needs met and your patient data safe.
Posted: 23 Oct 2015 | Published: 31 May 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement