Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Health

RSS Feed    Add to Google    Add to My Yahoo!
Environmental Health White Papers (View All Report Types)
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility
sponsored by TrendMicro
WHITE PAPER: See how security pros and decision makers are responding to the increased frequency, volume and ferocity of today's cyber threats to endpoint devices. Discover what realizations they've come to about their own security tools and posture and learn just how inadequate your current threat protection most likely is.
Posted: 11 Nov 2016 | Published: 31 Oct 2016

TrendMicro

Best Practices for Ransomware Detection and Remediation
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Firmwide Scenario Analysis and Stress Testing: Risk Perspective
sponsored by SAS
WHITE PAPER: Stress testing is a vital aspect of any business' success. Special techniques have emerged in recent years after the recent financial crisis. Access this white paper to learn about the future of firmwide stress testing, the importance of risk management, and more.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

SAS

Transformative Technology in Document Security
sponsored by HP
WHITE PAPER: This IDC Insight reviews how 3rd platform technologies such as mobile, cloud, and big data play a role in technology suppliers expanding their print security service offerings to prevent hackers from entering enterprise networks via print devices.
Posted: 24 Oct 2016 | Published: 29 May 2015

HP

4 Strategies to Reduce Your Open Source Risk
sponsored by Rogue Wave Software
WHITE PAPER: Open source software is widely used by developers, but unfortunately, it's rarely created with things like troubleshooting, compliance, and security in mind. Access this white paper to explore how to enhance open source management and uncover 4 strategies that will reduce risk and improve open source audits.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Rogue Wave Software

5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With Veeam Software
sponsored by Commvault
WHITE PAPER: Learn five reasons why you should rethink your data protection and information management vendor. Discover how factors like the scale of your organization, business attitude, innovation, and, most importantly, value should affect your next vendor decision.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

Ultimate Guide to Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Cybersecurity: The Ethics and Compliance Effect
sponsored by Navex Global
WHITE PAPER: Learn the important role ethics and compliance can play in your cybersecurity program and become better equipped to deal with security incidents.
Posted: 11 Nov 2016 | Published: 31 Oct 2016

Navex Global

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement