IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment White Papers (View All Report Types)
101 - 125 of 367 Matches Previous Page  |  Next Page
Financial Services Industry: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This report offers a high-level overview of the major threats trending across businesses worldwide over the past year. Access now for insight into the current threat landscape for the financial services industry and offers solutions that can help you better protect your organization overall.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

IBM

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: Access this SAP research paper to understand the threat of an SAP cyber breach and how organizations are managing the risk of information threat, modification of data and disruption of business processes. Learn from businesses that have been breached an average of two times in the past 24 months.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Onapsis

Four top cyber crime trends
sponsored by IBM
WHITE PAPER: This report provides insight into the security issues of today's IT environment. While incidents around the globe are diverse, most of them share certain characteristics and fit recurring patterns.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

IBM

EMC DATA PROTECTION SUITE 2015
sponsored by EMC & MicroAge
WHITE PAPER: This white paper shows you how to achieve simplicity and flexibility from your data protection. Access now and learn about a simplified, integrated approach that allows your organization to become more flexible while optimizing performance and reducing costs.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

EMC & MicroAge

Real-Time, Unified Endpoint Protection: A New Era in Incident Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about the only endpoint protection platform that natively integrates prediction, prevention, detection and response. Save considerable time, money and energy while simultaneously improving your overall security posture.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

EMC DATA PROTECTION SUITE 2015
sponsored by EMC & NextNet
WHITE PAPER: In this white paper, you will learn how you can better protect data residing throughout your enterprise. Access this resource now and find out how you can gain flexibility to quickly optimize performance while saving your organization money.
Posted: 11 Mar 2016 | Published: 31 Oct 2015

EMC & NextNet

Breaking Bad: The Risk of UnsecureFile Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the link between organizational and individual behavior when using increasingly popular file sync-and-share solutions.
Posted: 09 Mar 2016 | Published: 31 Oct 2014

IntraLinks, Inc

Next Generation Endpoint Protection Buyer's Guide
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about next-generation endpoint protection that can detect and prevent threats on endpoints using a unique behavior-based approach.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

What You Need to Know About Vendor Risk Management in Financial Institutions
sponsored by BitSight
WHITE PAPER: This white paper discusses several proactive tips for better vendor risk management (VRM) practices that you can quickly put into place. Learn to overcome challenges faced within the financial industry for taking on VRM and how you can adopt these security secrets and keep pace with today's growing threat landscape as advanced threats persist.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

BitSight

A Guide to 12 CyberSecurity Metrics You/Your Vendors Should be Watching
sponsored by BitSight
WHITE PAPER: This white paper details 12 actionable metrics that can help you specifically assess how your organization is doing with its current cybersecurity.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

BitSight

Cyber Security Intelligence Index for Manufacturing
sponsored by IBM
WHITE PAPER: This research report offers a high-level overview of the major threats trending across businesses worldwide over the past year.
Posted: 04 Mar 2016 | Published: 31 Dec 2015

IBM

IBM Report: Securing the C-suite
sponsored by IBM
WHITE PAPER: This white paper helps you understand the risks and vulnerabilities your network probably has and how to stop them from being exploited.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

IBM

The ABC of Security Strategy
sponsored by IBM
WHITE PAPER: This white paper highlights challenges organizations typically face in implementing effective security strategies. Learn how to manage risk and gain a competitive advantage in your field.
Posted: 03 Mar 2016 | Published: 31 Jan 2016

IBM

Dell Data Protection: Rapid Recovery
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, find out how you can protect anything, anywhere: systems, apps and data – fast and easy. Gain a reliable, admin-friendly solution that can be deployed as software or in scalable appliance form factors with all capabilities included.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Dell, Inc.

The Forrester Wave: Information Security Consulting Services
sponsored by IBM
WHITE PAPER: This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

IBM

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Security trends in the retail industry
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about different methods hackers use to steal customer data as well as statistics showing what time of year attacks are most prevalent. Learn how to defend yourself against hackers and how to respond if a breach does take place in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

Security trends in the healthcare industry
sponsored by IBM
WHITE PAPER: This white paper gives you the latest statistics on healthcare-related security breaches and how you can avoid becoming a statistic yourself by falling victim to attack. Learn about the most common cyberattacks against healthcare organizations and how to patch vulnerabilities you may have in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

The price of loyalty programs
sponsored by IBM
WHITE PAPER: This white paper shows you how to implement a loyal program for your customers and minimize the chance of account breaches. Learn how to diligently monitor your network and how to detect signs of attacks.
Posted: 14 Mar 2016 | Published: 30 Nov 2015

IBM

Next-Generation Endpoint Security
sponsored by Carbon Black
WHITE PAPER: This white paper provides a description of the requirements needed for Next-Generation Endpoint Security and the information you need to successfully protect your organization.
Posted: 07 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Breach Detection: What you need to know
sponsored by Carbon Black
WHITE PAPER: This e-book outlines the tactics today's advanced attackers use to steal your sensitive data and why you need a defense-in-depth cybersecurity program that incorporates automatic detection with incident response.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Advanced Threat Hunting with Carbon Black Enterprise Response
sponsored by Carbon Black
WHITE PAPER: This white paper covers the capabilities necessary to proactively and efficiently hunt for threats across your enterprise. Learn how to expand detection beyond the point of compromise.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Every Second Counts: Unravel the entire attack and disrupt attacker behavior
sponsored by Carbon Black
WHITE PAPER: Access this white paper and find out how one solution can unravel an entire attack and disrupt the attacker's behavior to help you stay ahead. Learn how your organization can benefit from complete endpoint visibility, faster detection of advanced threats, more effective remediation, and much more.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Data Sheet: Carbon Black Security Solution Overview
sponsored by Carbon Black
WHITE PAPER: This white paper shows you how to enable your organization to disrupt advanced attacks and deploy the best prevention strategies for your business. Learn how to achieve real-time visibility in your network.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Carbon Black
101 - 125 of 367 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement