Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Safety

RSS Feed    Add to Google    Add to My Yahoo!
Environmental Safety White Papers (View All Report Types)
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007


Continuous Security Monitoring
sponsored by Qualys
WHITE PAPER: Hackers will eventually get in, and when they do, you need to be able to detect them before they do any lasting damage. This white paper discusses the importance of continuous security monitoring (CSM) and gives advice for effectively implementing it.
Posted: 16 Oct 2015 | Published: 25 Sep 2013


Adopt a faster, simpler, more flexible business management solution
sponsored by Sage (UK) Limited
WHITE PAPER: Access this white paper now to get a flexible data model that supports complex organizational deployment and reporting structures to simplify management across multiple facilities, companies or business units, regions and countries from a common installed instance of the solution.
Posted: 21 Oct 2015 | Published: 21 Oct 2015

Sage (UK) Limited

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Protective Monitoring and the UK Public Services Network
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper addresses the specific security concerns of government organizations and discusses why protective monitoring is essential for keeping your citizens safe.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

LogRhythm, Inc.

Case Study: Local Government Finds Cybersecurity that Meets its Budget
sponsored by AlienVault
WHITE PAPER: This white paper tells the story of how the IT managers for the City of Lewiston found a security solution that worked for them, keeping their network secure without incurring additional costs or requiring additional manpower.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


Case Study: Sharing Files without Compromising Security
sponsored by FinalCode
WHITE PAPER: In this case study, discover how an electrical service organization obtained quick and easy file-sharing that didn't compromise its security.
Posted: 05 Oct 2015 | Published: 30 Apr 2015


Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This white paper breaks down the 20 critical security controls developed by SANS, discussing how you can best follow them.
Posted: 16 Oct 2015 | Published: 31 Mar 2013


How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

The Practitioner’s Guide to Data Profiling
sponsored by SAS
WHITE PAPER: Access this white paper to discover how you can clarify specific analysis process and techniques that use data profiling technology to establish a well-defined scope with specific, achievable goals for your organization.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement