Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk Management White Papers (View All Report Types)
 
Hacker Intelligence Initiative Report: The Threat is Already Within
sponsored by Imperva
WHITE PAPER: Discover how you can best protect your organization from insider threats through investigation and early detection tools. Learn about the 3 main classifications for insider threats and how to best mitigate them.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

Imperva

The Definitive Guide to Data Loss Prevention Healthcare Edition
sponsored by Digital Guardian
WHITE PAPER: This comprehensive guide provides what you need to understand, evaluate, and succeed with DLP in healthcare systems. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts.
Posted: 09 Aug 2016 | Published: 01 Jul 2016

Digital Guardian

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

Advanced Persistent Threats and the Case for a Security Intelligence and Response Program
sponsored by Above Security
WHITE PAPER: Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

Building Success: Strengthen your Data Discovery and Classification
sponsored by IBM
WHITE PAPER: How can you strengthen your data foundation without compromising its integrity? This Forrester Research Report breaks down the struggle with data discovery and security. What are strong approaches to data classification that you can implement in your company moving forward? Read this report now and find out.
Posted: 25 Jul 2016 | Published: 01 Oct 2014

IBM

IT Security for Retail
sponsored by Trustwave
WHITE PAPER: This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

The Axway MFT Solution Transcript
sponsored by Axway
WHITE PAPER: It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.
Posted: 23 Jun 2016 | Published: 01 May 2016

Axway

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Safeguard Sensitive Data Against Insider Threats and External Attacks: Top 5 scenarios
sponsored by IBM
WHITE PAPER: A modular security solution that allows you to deploy defense capabilities are you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent harmful occurrences like data breaches, insider attacks, fraud and unauthorized destruction of sensitive data.
Posted: 25 Aug 2016 | Published: 01 Nov 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement