IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment White Papers (View All Report Types)
1 - 25 of 377 Matches Previous Page  |  Next Page
The Threat Landscape
sponsored by Kaspersky Lab
WHITE PAPER: Download the latest from Kaspersky Lab's security experts, and you will find updates on common vulnerabilities and exploits, Insights into the current state of threats and tips to improve employee security awareness.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Could Your Business Survive a Cryptor?
sponsored by Kaspersky Lab
WHITE PAPER: Learn how you can prevent such an attack and protect your business.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Debunking the Top 5 Security Implementation Myths
sponsored by Kaspersky Lab
WHITE PAPER: This e-book aims to show you that replacing your old cybersecurity can be quick and painless. Access now to learn 5 myths about implementing IT security.
Posted: 04 May 2016 | Published: 01 Dec 2015

Kaspersky Lab

Virtualization Security Options: Choose Wisely
sponsored by Kaspersky Lab
WHITE PAPER: This white paper describes different virtualization security solution options - conventional agent-based, agentless, and Light Agent. Access now to learn possible scenarios for aligning the right security approach to your organization's virtual environment.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

It’s Time to Get Real With SDN and NFV
sponsored by Accelerated Concepts
WHITE PAPER: This white paper shows you a universal network appliance that uses NFV technology and comes at a price point that sets a breakthrough standard for the entire industry. Access now to learn about a simple, inexpensive and open path to SDN to develop new services, improve network performance and drive new business opportunities.
Posted: 04 May 2016 | Published: 01 Apr 2016

Accelerated Concepts

ATP Sandboxing White Paper
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper offers you the ultimate combination of proactive mitigation, visibility and rich reporting. Access now to learn about antivirus and threat-scanning technology, dual-level sandboxing and the option of additional integration with the cloud.
Posted: 03 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Data Breach Investigation Report
sponsored by Verizon
WHITE PAPER: This report gives you statistics from over 100,000 incidents, of which 3,141 were confirmed data breaches. It shows you important breach trends from the past year with charts and figures to illustrate the threat landscape.
Posted: 03 May 2016 | Published: 01 Apr 2016

Verizon

4 Steps to Implementing Data Protection in Healthcare
sponsored by Digital Guardian
WHITE PAPER: This white paper talks about important compliance policies that every healthcare organization must be in compliance with and how to best comply with these regulations using Data Loss Prevention tools.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Forrester Report - Industry Spotlight: US Healthcare Security Budgets and Priorities
sponsored by Digital Guardian
WHITE PAPER: This white paper helps healthcare security professionals learn from their peers and provides best practices for addressing critical security risks. Access now to learn how you can better protect private patient information and retain your organization's good reputation.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

The Executive’s Guide to the 2016 Global Threat Intelligence Report - Insights to protect your organisation against cybercrime in the digital era
sponsored by Dimension Data
WHITE PAPER: This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

2016 Global Threat Intelligence Report - Insights to Protect your Organisation against Cybercrime in the digital era
sponsored by Dimension Data
WHITE PAPER: This white paper shows you statistic about the past year's detected cyberattacks and gives you insight to protect your organization against cybercrime in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Taking Container Security to the Next Level Final
sponsored by Black Duck Software
WHITE PAPER: This white paper explores the security concerns around container use and details how security professionals can enact measures to mitigate the dangers. Access now to learn how you can protect code integrity when containers are in use and safely utilize open source code in general.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

SCIENCELOGIC: Unmatched Visibility into Open Source with Black Duck
sponsored by Black Duck Software
WHITE PAPER: This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improved efficiency and, most importantly, security by reviewing their code before their products hit the market and seeing exactly what they needed to change.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

MAX-Mail-Email-Security-11-04-16
sponsored by LogicNow
WHITE PAPER: This white paper looks at email security for mid-sized businesses. Explore solutions available and what features these organizations cannot do without.
Posted: 02 May 2016 | Published: 01 Apr 2016

LogicNow

The Total Economic Impact Of Forcepoint’s SureView Insider Threat Single Company Analysis
sponsored by Forcepoint
WHITE PAPER: This white paper shows you an appliance-based security system that monitors and investigates internal threats across all endpoints and channel communications.
Posted: 02 May 2016 | Published: 01 Oct 2014

Forcepoint

Virtualization Best Practices Guide
sponsored by Kaspersky Lab
WHITE PAPER: This white paper shows you how to best protect your virtual desktops through a wide range of Windows-based environments. Choose the security approach that's best for your business' specific virtual needs.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

IT Risk Report 2015
sponsored by Kaspersky Lab
WHITE PAPER: This report shows you the results of a security survey of organizations across industries. Access now for exclusive insight into the views, opinions and strategies of IT professionals from around the world.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

ESG_Lab_Validation_Fortinet_ATP
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shows you an end-to-end modular framework for addressing cybersecurity using advanced threat protection. Access now to learn how to automate your identification, prevention and mitigation of malware, providing protection throughout your ecosystem.
Posted: 02 May 2016 | Published: 01 Feb 2016

Fortinet, Inc.

Under Siege: The CyberSecurity Threat
sponsored by Black Duck Software
WHITE PAPER: This white paper helps you find out before you start development whether your open source code has known vulnerabilities. Immediately find out when new vulnerailities surface in your code and find out how to fix them.
Posted: 02 May 2016 | Published: 01 Apr 2016

Black Duck Software

GLOBAL BANK REDUCES SECURITY RISKS & REAPS COST BENEFITS OF OPEN SOURCE
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you how to properly identify and implement OSS to fit your business' needs. Save time and money by automating the management of open source code from the point it enters your organization and through development.
Posted: 02 May 2016 | Published: 01 Apr 2016

Black Duck Software

What Is the Cost of One More Test?
sponsored by Ixia
WHITE PAPER: This white paper gives you up to date statistics on today's cyber threat landscape and shows you how you can get ahead with early prevention. Access now to see where other organizations failed and how you may better protect yourself against today's most dangerous attacks.
Posted: 02 May 2016 | Published: 01 Apr 2016

Ixia

The Workstation Monitoring Imperative
sponsored by Intersect Alliance
WHITE PAPER: This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.
Posted: 02 May 2016 | Published: 01 Apr 2016

Intersect Alliance

Unlocking Business Success The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Gartner Magic Quadrant for Intrusion Prevention Systems
sponsored by Intel Security
WHITE PAPER: This report teaches you about the market for stand-alone IPS appliances. Access now to learn about the evolution of enterprise-class network firewalls that include application awareness and policy control.
Posted: 04 May 2016 | Published: 16 Nov 2015

Intel Security

Information Sharing Defeats Data Security Threats
sponsored by Anomali
WHITE PAPER: This white paper teaches you about information sharing to quell security problems. Learn how to share information with trusted peers adhere to standards and integrate ith popular security software. Access now to enable information sharing that best suits your business' needs.
Posted: 04 May 2016 | Published: 01 Apr 2016

Anomali
1 - 25 of 377 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement