Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed    Add to Google    Add to My Yahoo!
Industrial Safety White Papers (View All Report Types)
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Safety Certification for Charging Stations
sponsored by TechData - Ergotron
WHITE PAPER: This white paper explores the significance of making sure that suppliers ensure device charging systems are safe as a whole, not as individually certified components. Learn about the risks of using non-certified products and how you can not only meet but exceed the existing safety and EMC regulatory requirements.
Posted: 13 Apr 2017 | Published: 30 Jun 2014

TechData - Ergotron

Secure and Accelerate User Access to Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

The Power of Linking Business Analysis and TOGAF® to Achieve IT Results
sponsored by Global Knowledge
WHITE PAPER: This white paper addresses the The Open Group's Architecture Framework (TOGAF) framewo­­­rk and a high-level overview of the key business analysis techniques that IT professionals would benefit from to achieve IT results and establish a valued partnership with the business.
Posted: 06 Jan 2017 | Published: 03 Jan 2017

Global Knowledge

SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
sponsored by ThreatConnect
WHITE PAPER: Examine how you can enhance your SIEM tool with a cybersecurity platform to take control of the data chaos, gain a fuller understanding of threats, eliminate false positives, and form a proactive and intelligence-driven defense.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

ThreatConnect

Closing the Skills Gap: Leveraging Automated Analytics for Cybersecurity
sponsored by RSA
WHITE PAPER: This white paper explores how to bring automated analytics to bear and bolster your cybersecurity strategy. Overcome the talent shortage and discover how to leverage machine learning, AI, and cognitive capabilities in order to integrate analysis of user behavior patterns into incident detection.
Posted: 04 Apr 2017 | Published: 31 Dec 2016

RSA

Business Management Software ROI Improvement Guide
sponsored by Sage Software
WHITE PAPER: Aligning technology with your business goals is one of the smartest ways to optimize any software investment (especially when it comes to the cloud). Access this ROI improvement guide to learn how to maximize your business management software solutions to drive great agility and SaaS cost savings.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Sage Software

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

2016 Security Operations Center Report
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Neustar
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement