Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Safety

RSS Feed    Add to Google    Add to My Yahoo!
Environmental Safety White Papers (View All Report Types)
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Lowering Business Risk with Data
sponsored by Cloudera
WHITE PAPER: Companies must stay one step ahead of looming risks. Learn how you can reduce your overall risk exposure by more effectively leveraging your data.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

Cloudera

How To Implement a Records and Information Management Risk Control Framework
sponsored by Iron Mountain
WHITE PAPER: In this white paper, learn about records and information management (RIM) controls you can implement to mitigate data risk. For example, learn the 9 major categories of RIM risk controls, how you can parcel out the responsibility of these categories to your employees, and more.
Posted: 20 Mar 2017 | Published: 31 Dec 2015

Iron Mountain

2016 Cyber Threat Defense Report
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

How to Keep Your Data Secure In An Increasingly Insecure World
sponsored by Micron
WHITE PAPER: Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.
Posted: 13 Feb 2017 | Published: 01 Nov 2015

Micron

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Why License Compliance is a C-Level Issue
sponsored by Matrix42
WHITE PAPER: Increasing software license complexity wouldn't normally be seen as a C-level issue, but it is now. Access this white paper to learn how to focus your strategy on a centralized license compliance solution that is integrated into the complete IT management lifecycle and why C-level executives need to take a proactive approach.
Posted: 15 Feb 2017 | Published: 31 Dec 2015

Matrix42

Remove the Security Blind Spots Created by Encrypted Traffic
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

A New Trend in Agile - Incorporating Program Management
sponsored by Global Knowledge
WHITE PAPER: How can organizations in diverse industries continue to use familiar waterfall practices and at the same time be more Agile? The answer is to use Agile program management - learn more about these principles inside.
Posted: 13 Dec 2016 | Published: 13 Dec 2016

Global Knowledge

2016 Neustar DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.
Posted: 29 Sep 2016 | Published: 30 Apr 2016

Neustar
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement