IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment White Papers (View All Report Types)
1 - 25 of 484 Matches Previous Page  |  Next Page
In the Market for a New Key Manager? Then Get in on a Good Thing!
sponsored by Gemalto
WHITE PAPER: This white paper gives you four key reasons why you need to switch to a central key manager. Learn about a full portfolio of flexible encryption options that work on-premises, in traditional data centers and virtualized cloud environments.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gemalto

The Road to SDN is Paved with Visibility and Many Good Intentions
sponsored by Gigamon
WHITE PAPER: Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Application Session Filtering
sponsored by Gigamon
WHITE PAPER: Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.
Posted: 27 May 2016 | Published: 31 Dec 2015

Gigamon

Security for Virtualization Getting the Balance Right
sponsored by Kaspersky Lab
WHITE PAPER: Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.
Posted: 26 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Kaspersky in Action
sponsored by Kaspersky Lab
WHITE PAPER: In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection?
Posted: 26 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

IDC Server Security: Virtualization and Cloud Changes Everything
sponsored by TrendMicro
WHITE PAPER: Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Complete Data Protection (Advanced) - Data Sheet
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Protecting End of Support Systems
sponsored by TrendMicro
WHITE PAPER: You have options available to address and reduce your risk. What you need is comprehensive security controls that can protect older systems like Windows Server 2003 while you plan and execute a transition that makes sense for your business. Review the risks facing your organization and learn how you can smoothly transition into newer software.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise
sponsored by Kaspersky Lab
WHITE PAPER: A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

The Threats From Within
sponsored by Kaspersky Lab
WHITE PAPER: With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.
Posted: 25 May 2016 | Published: 25 May 2016

Kaspersky Lab

Virtualization Security: Know Your Options
sponsored by Kaspersky Lab
WHITE PAPER: Discover the top three options for delivering security to your virtual servers. Go in-depth on agent-based security, agentless security and light agent security to see which option fits your unique IT architecture.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.
sponsored by Kaspersky Lab
WHITE PAPER: In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Management of Native Encryption for Apple FileVault and Microsoft BitLocker
sponsored by Intel Security
WHITE PAPER: With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack. This resource can help ensure you don't end up on the data breach victim's list.
Posted: 25 May 2016 | Published: 01 Apr 2016

Intel Security

Application Session Filtering Cookbook
sponsored by Gigamon
WHITE PAPER: This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.
Posted: 24 May 2016 | Published: 31 Dec 2015

Gigamon

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Gemalto
WHITE PAPER: This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.
Posted: 24 May 2016 | Published: 24 May 2016

Gemalto

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

SANS Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by TrendMicro
WHITE PAPER: Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.
Posted: 24 May 2016 | Published: 01 Feb 2016

TrendMicro

Protecting Valuable Data Assets
sponsored by Intel Security
WHITE PAPER: Most organizations are aware of the results of not adequately protecting their data, ranging from regulatory penalties to the detrimental costs associated with any data breach. View today's featured resource as we reveal several solutions for protecting data while reducing cost and complexity and allowing for real-time forensic analysis.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

Gartner Research Paper Enterprise Firewall
sponsored by Fortinet, Inc.
WHITE PAPER: This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

SB-Secure-Access-for-Retail
sponsored by Fortinet, Inc.
WHITE PAPER: When the same network is used by your shoppers and retail associates alike, it's critical that your network security is capable of detecting advanced threats to protect business assets. Discover how to segment devices and access layers across wired and wireless networks to ensure your network is secured from all access points.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

When Visibility is not Enough: Taking Control of Your Data
sponsored by Intel Security
WHITE PAPER: In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

When App is the Business, the Business is the App Vol. 3
sponsored by IBM MaaS360
WHITE PAPER: IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360
1 - 25 of 484 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement