IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment White Papers (View All Report Types)
126 - 150 of 477 Matches Previous Page  |  Next Page
Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: More than four in ten organizations are in the process of implementing Office 365 or already use it. This infographic gives you important statistics and insights on the top security, encryption and archiving challenges faced while moving to Office 365, based on a survey conducted by UBM Tech.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

FINRA Regulations Require Technology Innovation to Address Supervision and Monitoring Workload
sponsored by Proofpoint, Inc.
WHITE PAPER: Business leaders need to find a healthy balance between flexible business solutions and data monitoring abilities. Learn how to protect and govern your sensitive information to help mitigate risk and, in the process, better comply with regulatory requirements.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Proofpoint Advanced Security Platform for Microsoft Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: Safeguard against advanced threats and targeted attacks to your Office 365 users. Gain visibility and threat insights to identify attacks quickly and contain them as early as possible.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Impact Assessment of a Gigamon Partnership
sponsored by Gigamon
WHITE PAPER: This Forrester Report examines the ROI enterprises may realize from deploying Gigamon for network security needs. It provides readers with clear cut choices to evaluate the possible financial impact of Gigamon on their organization.
Posted: 07 Jun 2016 | Published: 01 May 2016

Gigamon

Reporting Cybersecurity to the Board
sponsored by BitSight
WHITE PAPER: Today, boards have to consider the regulatory, fiduciary, organizational, and personal liability that could come from a data breach. Download this free guide today, and you'll have everything you need for your next board presentation to hit all the right points.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

Revealing Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: In its latest research report, BitSight studied the security performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale
sponsored by Anomali
WHITE PAPER: To address growing scalability issues, organizations will need to embrace a distributed computing approach to security. In addition, Threat Intelligence Platforms will need to create organizational relevance for threat intelligence data.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Anomali

An Operational Model for Breach Analytics and Intelligence
sponsored by Anomali
WHITE PAPER: In the face of this situation, a new approach to security strategy and operations must be adopted. Discover an approach that focuses on operational relevance, reducing adversary dwell time and speeding incident response activities.
Posted: 06 Jun 2016 | Published: 01 May 2016

Anomali

Why Today's Phishing Attacks are Harder to Detect
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.
Posted: 06 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works
sponsored by HID
WHITE PAPER: In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

vanGO® One-2-One™ Personalized Security
sponsored by HID
WHITE PAPER: With several different card, hardware and software options available, designing the right solution for your organization is easy. vanGO is a total solution consisting of cards, hardware and software that work together to create a simple, secure, and cost-effective system.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM MaaS360
WHITE PAPER: This white paper shows you a comprehensive portfolio of mobile security solutions that address four key mobile security challenges. Learn intelligent, integrated and innovative approaches that can help your organization stay ahead of emerging threats while managing operational risks and lowering cost of a strong security posture.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM MaaS360

The State of Mobile Security Maturity
sponsored by IBM MaaS360
WHITE PAPER: This study takes the mobile security pulse of large enterprises worldwide. It'll help you assess where you are on this emerging mobile security maturity scale and giving you an indication of where you should make your mobile security investments moving forward.
Posted: 03 Jun 2016 | Published: 31 Dec 2014

IBM MaaS360

Securing mobile productivity for Microsoft Office 365
sponsored by IBM MaaS360
WHITE PAPER: Take the complexity out of securing your mobile workforce. Learn how to secure your Microsoft ecosystem across all mobile platforms, including Windows 10. Enable IT to efficiently manage enterprise productivity, connectivity and security today and into the future.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Protect Confidential Data While Keeping Mobile Users Productive
sponsored by IBM MaaS360
WHITE PAPER: Common sense dictates that you look for ways to supplement your mobile device management (MDM) solution with additional, more robust security controls. This white paper helps you identify the goals for your MDM security strategy and select the best approach to reach those goals.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Build a common identity profile and hub out of disparate identity sources
sponsored by Radiant Logic, Inc.
WHITE PAPER: Discover how to renew your existing IAM investments, making them a strategic infrastructure solution that supports current identity needs and adapts quickly to future requirements as they arise.
Posted: 02 Jun 2016 | Published: 01 May 2016

Radiant Logic, Inc.

The Rise of the Cloud Security Professional
sponsored by (ISC)2 UK Ltd
WHITE PAPER: The problem with implementing a secure cloud strategy comes in the lack of understanding around how to define cloud computing and its risks. By employing credentialed cloud security professionals, you can ensure your organizations is using the today's best practices that can maintain secure cloud computing infrastructures.
Posted: 01 Jun 2016 | Published: 31 Dec 2015

(ISC)2 UK Ltd

Get Help Tracking Down the Leak
sponsored by Exabeam
WHITE PAPER: Learn how to best utilize UBA and threat hunting in your security intelligence platform to proactively catch unwanted activity across your network.
Posted: 31 May 2016 | Published: 01 Apr 2016

Exabeam

The Road to SDN is Paved with Visibility and Many Good Intentions
sponsored by Gigamon
WHITE PAPER: Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Application Session Filtering
sponsored by Gigamon
WHITE PAPER: Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.
Posted: 27 May 2016 | Published: 31 Dec 2015

Gigamon

Application Session Filtering 101
sponsored by Gigamon
WHITE PAPER: This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.
Posted: 24 May 2016 | Published: 31 Dec 2015

Gigamon

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault
126 - 150 of 477 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement