IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment White Papers (View All Report Types)
1 - 25 of 226 Matches Previous Page  |  Next Page
Optimized Sourcing in Hybrid IT Environments: Impacts and Improvements
sponsored by IBM
WHITE PAPER: This white paper explains how multiple-sourced, hybrid IT and business reality is developing and accelerating. Read on to find out how to manage your hybrid IT environment, as well as to engage third-party research that will assess sourcing services for your organization.
Posted: 01 Sep 2015 | Published: 30 Apr 2014

IBM

Build Confidence in Your Resiliency Program Through Functional Validation
sponsored by IBM
WHITE PAPER: This white paper will explore the requirements for a structured approach to exercising the various components of an enterprise resiliency program. Read on here to access the directions for this three-part business resiliency testing process.
Posted: 31 Aug 2015 | Published: 31 Oct 2014

IBM

Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013

VMware

Maximize ROI by Deploying Strategic Partners in UC&C
sponsored by Polycom, Inc.
WHITE PAPER: In this white paper, you will learn how to minimize deployment risk, while providing IT leaders with a rock-solid deployment with minimal challenges. Learn how to integrate your existing UC infrastructure with potential new voice/video vendors, as well as how to strategize with your partners and leverage your relationship with them.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Polycom, Inc.

Addressing Liquidity and Solvency Risk
sponsored by IBM
WHITE PAPER: In this white paper, learn more about how different industries are responding to these changes. This survey unlocks some of the key differences in the industry, and what that could mean for your business.
Posted: 22 Aug 2015 | Published: 22 Aug 2015

IBM

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Managing Threats and Remediating Risk for State of Vermont Applications
sponsored by Core Security Technologies
WHITE PAPER: In this case study, the Vermont state government struggles to detect and mitigate all vulnerabilities in the applications that handle its sensitive data.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Extracting More Value from SIEM Deployment
sponsored by Splunk
WHITE PAPER: This white paper demonstrates how to you leverage all your machine-generated data for broader views across possible attack vectors. Read on to key into the solutions behind bolstering against potential threats.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Splunk

Advanced Threat Detection and Response
sponsored by Splunk
WHITE PAPER: This white paper explains how to detect advanced threat activity from both the host and the network perspectives and advises on several solutions to combat these threats.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Splunk

Best Practices for Threat & Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses what you can do to adapt your vulnerability management to the modern threat landscape.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Core Security Technologies

A SANS Survey: How Does Your Security Stack Up?
sponsored by LogRhythm, Inc.
WHITE PAPER: Information security continues to be a work in progress for many financial services companies. In this white paper, you will key into an annual SANS survey on the security of the financial services sector, and learn how to apply your enterprise's resources to the specific categories of threats that you face, both internal and external.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

Build Security that's Proactive, Not Reactive
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses the importance of proactive security and how you can build that kind of security in your environment.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

From Project to Product
sponsored by Red Hat
WHITE PAPER: Software developed by an open source community with testing, certification, documentation, training and support can help IT organizations experience lower middleware with total cost of ownership and risk. Read this white paper to learn about the benefits of open source technology.
Posted: 03 Aug 2015 | Published: 31 Dec 2014

Red Hat

4 Secrets to Security: Engaging a Meaningful Dialogue
sponsored by Citrix
WHITE PAPER: Security is of greater interest to corporate boards than ever before and an effective security strategy is crucial. This white paper highlights 4 ways to engage your board of directors in a meaningful discussion about security-related risks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Strategic Migration Planning Guide: WebSPHERE to JBoss Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: This migration planning guide provides a five-step process designed to identify migration opportunities, examine risks, create a standard enterprise environment, and develop a strategic migration plan. Read now for insight into the considerations and processes required to move to an enterprise app platform.
Posted: 28 Jul 2015 | Published: 30 Sep 2014

Red Hat

Gartner Security & Risk Management Summit 2015: Schedules, Speakers, and More
sponsored by Gartner
WHITE PAPER: Access the following brochure to learn about the various topics, schedules, and strategies that will be covered during this year's Gartner Security and Risk Management Summit. Read on to learn will be speaking, future technology predictions, and more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

Gartner

2015 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper provides the full details on the 2015 global data breach study, and shows you how to adequately protect your data. Read on to learn more about why the costs of data breaches have increased, and how you can respond immediately in the event of a breach.
Posted: 10 Jul 2015 | Published: 31 May 2015

IBM

Raising Your Google Ranking: A Guide
sponsored by Symantec Corporation
WHITE PAPER: To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

Symantec Corporation

Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

WhiteHat Security

Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 01 Jul 2015 | Published: 13 May 2015

Neustar®

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

The Cloud at Your Pace
sponsored by Rackspace
WHITE PAPER: Access this white paper for the 8 top cloud concerns and learn how you can address them, while minimizing your risks, and moving to the cloud at your own pace.
Posted: 13 May 2015 | Published: 13 May 2015

Rackspace

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

3 Step Guide for IT Governance & Compliance
sponsored by Dell Software
WHITE PAPER: This white paper details the three critical steps for maintaining compliance with external regulations and internal security policies. Read on to learn the four key external regulations to consider when preparing an IT compliance audit. Read on to learn more.
Posted: 23 Feb 2015 | Published: 13 Dec 2012

Dell Software

Does Your Planning & Forecasting Consider Risk? It Should.
sponsored by IBM
WHITE PAPER: Incorporating risk information into the planning process you can reduce risk and include both risk and performance metrics in your measures and incentives.This white paper explains why Risk-Adjusted Planning should be a goal for your organization. Create a culture that embraces risk management as a chance to optimize performance.
Posted: 11 Feb 2015 | Published: 13 May 2011

IBM
1 - 25 of 226 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement