Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed    Add to Google    Add to My Yahoo!
Industrial Safety White Papers (View All Report Types)
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007


Improving Your Web Security Intelligence by Contextualizing Data
sponsored by Akamai
WHITE PAPER: This white paper highlights the key components missing from your web security intelligence strategy. Learn how to secure your apps, web tools, and critical business information against a myriad of attacks and develop a holistic web security strategy.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Protect Your Intellectual Property and Customer Data From Theft and Abuse
sponsored by TITUS
WHITE PAPER: This Forrester report shows you how to take an effective and holistic approach to data security in today's challenging environment.
Posted: 13 Nov 2015 | Published: 10 Jul 2015


Special Report: Threat Intelligence in Late 2015
sponsored by IBM
WHITE PAPER: This quarterly threat intelligence reveals the newest developments in cybercrime, helping you to stay secure against today's most dangerous threats.
Posted: 13 Oct 2015 | Published: 31 Aug 2015


Conquering Network Security Challenges in Distributed Enterprises
sponsored by Palo Alto Networks
WHITE PAPER: This whitepaper provides guidance for businesses evaluating the current state of their network security. Learn how to centralize network security governance and prioritize threats without affecting business flow.
Posted: 15 Oct 2015 | Published: 30 Jun 2015

Palo Alto Networks

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to discover why security intelligence is so important in today's threat environment and to learn how to implement it in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.

Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

LogRhythm, Inc.

2015 Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


Database Security: Protect your Business Reputation
sponsored by Oracle Corporation
WHITE PAPER: This report discusses how to prevent data misuse or theft with better access control and privilege management for your databases.
Posted: 28 Oct 2015 | Published: 31 Jan 2015

Oracle Corporation

Gartner Critical Capabilities for SIEM
sponsored by Intel Security
WHITE PAPER: As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Posted: 23 Oct 2015 | Published: 25 Jun 2014

Intel Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement