IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentWhite Papers (View All Report Types)
1 - 25 of 182 Matches Previous Page  | Next Page
Measure Risks and Vulnerability Effectively
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals.
Posted: 16 Apr 2014 | Published: 31 May 2013

Hewlett-Packard Limited

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from last year's  governance, risk, and compliance (GRC) forum to learn what latest trends you should consider for your strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 03 Apr 2014 | Published: 31 Jan 2014

IBM

The Safe On-Ramp to Big Data
sponsored by Informatica
WHITE PAPER: This white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
Posted: 27 Mar 2014 | Published: 31 May 2013

Informatica

Security intelligence is the smart way to keep the cloud safe
sponsored by IBM
WHITE PAPER: This white paper will examine the intelligence capabilities necessary for gaining visibility into, and control over, cloud security. It also demonstrates how an integrated suite of end-to-end security intelligence solutions can help meet cloud security needs.
Posted: 25 Mar 2014 | Published: 31 Oct 2013

IBM

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

IBM

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER: This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 21 Feb 2014 | Published: 31 Dec 2012

IBM

Mom, Apple Pie, and the Office of Comptroller of the Currency
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Iron Mountain

Dealing with Governance, Risk & Compliance in an Info-Centric World
sponsored by CommVault Systems, Inc.
WHITE PAPER: View this comprehensive report from Quocirca Research on how to manage multiple aspects of governance, risk, and compliance (GRC), and learn why a comprehensive GRC platform -- as opposed to a combination of different tools -- can help you effectively manage your organization's information assets.
Posted: 11 Feb 2014 | Published: 31 Oct 2013

CommVault Systems, Inc.

Prepare Now and Save Later: Guide to Business Continuity and Disaster Recovery Implementation
sponsored by Veeam Software
WHITE PAPER: Take a look at this in-depth white paper to find out how this backup and replication solution helps organizations plan and implement a disaster recovery and business continuity that is capable of supporting their demanding data centers.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Veeam Software

EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
sponsored by IBM
WHITE PAPER: Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
Posted: 06 Dec 2013 | Published: 03 Jul 2013

IBM

Business Transformation: Exploring the Requirements of a Strategic Business Transformation
sponsored by Hewlett-Packard Limited
WHITE PAPER: To keep up with market demands and trends, it is important for organizations to transform their business. This guide explores business transformation and how it reduces risk and cost
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Hewlett-Packard Limited

Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM

The State of Next-Generation Market- and Credit-Risk Analytics
sponsored by IBM
WHITE PAPER: Access the following white paper to gain a firsthand look at the next-generation market and credit-risk analytics that are helping many companies through this touch economic time.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

IBM

Mastering Risk with Business Forecasting
sponsored by IBM
WHITE PAPER: This paper discusses how it is risk management practices that play a key part of managing risk today, and shows how developing a more sophisticated understanding of risk and building the management capabilities to match can help organizations stay afloat during tumultuous times.
Posted: 06 Nov 2013 | Published: 06 Nov 2013

IBM

Three Mistakes Companies Make When It Comes to Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Core Security Technologies

Liquidity risk management; Assessing and planning for adverse events
sponsored by IBM
WHITE PAPER: This paper takes a close look at the factors involved in the recent crisis and the patterns that resulted in widespread liquidity problems. It also points to specific vulnerabilities faced by financial institutions currently, and highlights best practices for liquidity risk management
Posted: 30 Sep 2013 | Published: 30 Sep 2013

IBM

The Architecture of Next-Generation Intraday Liquidity Risk Management
sponsored by IBM
WHITE PAPER: This paper explores potential risk solutions to this challenge, establishing the historic context of liquidity risk management and the specific business problem of intraday liquidity risk.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

IBM

An insurance firm eases regulatory compliance while reducing risk
sponsored by IBM
WHITE PAPER: Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

IBM

Strategy guide to business protection for hospitals
sponsored by HP and Intel® Xeon® processors
WHITE PAPER: This white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how you can avoid unplanned downtime, ensuring compliance and the highest quality of patient care.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP and Intel® Xeon® processors

Combating risk with predictive intelligence: An analytical approach to enterprise risk management
sponsored by IBM
WHITE PAPER: View this resource to learn more about how your organization can respond and increase their focus on refining sales and operations planning processes. It outlines how companies can reevaluate and distribute their channel strategies and strengthen relationships.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

IBM
1 - 25 of 182 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement