Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk White Papers (View All Report Types)
 
Don’t Let “Trusted” Vendors Become Cyber-Breach Enablers
sponsored by BitSight
WHITE PAPER: This resource uncovers how evaluate vendors' security ratings simply and effectively. Learn how to police the safety of the vendors entrusted with handling your sensitive data to enhance your vendor risk management program no matter where it is on the maturity curve.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

Advanced Persistent Threats and the Case for a Security Intelligence and Response Program
sponsored by Above Security
WHITE PAPER: Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

Breach response: It's about keeping your customers safe
sponsored by AllClear ID
WHITE PAPER: Learn how to deliver a timely, organized breach response that boosts customers' confidence, repairs customers' identities if they've been victimized and helps minimize irreparable damage to your brand. Ensure peace of mind by giving your assurance that your organization values both their identities and their loyalties.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

The Axway MFT Solution Transcript
sponsored by Axway
WHITE PAPER: It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.
Posted: 23 Jun 2016 | Published: 01 May 2016

Axway

Ponemon Institute Application Security Risk Management Study
sponsored by IBM
WHITE PAPER: This report shows you the results of the recent Ponemon Institute study entitled "How to Make Application Security a Strategically Managed Discipline". Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

How Healthcare Benefits from Cloud-Delivered Security
sponsored by OpenDNS
WHITE PAPER: Cloud-delivered security is a cost-efficient and flexible method for dealing with healthcare security threats, while also improving your organization's ability to meet expanding compliance mandates. Discover how you can protect the full range of systems and requirements in your organization.
Posted: 26 Aug 2016 | Published: 01 Jul 2016

OpenDNS

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Tolly evaluation: IBM Security Access Manager
sponsored by IBM
WHITE PAPER: In this white paper, Tolly evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

Cb Defense
sponsored by Carbon Black
WHITE PAPER: Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.
Posted: 27 Jul 2016 | Published: 01 Jun 2016

Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement