IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentWhite Papers (View All Report Types)
126 - 150 of 270 Matches Previous Page  | Next Page
Safeguard your organization from Red Flags Rule non compliance
sponsored by Iron Mountain
WHITE PAPER: Since the Red Flags Rule took effect in 2011, there has been a lot of confusion over which businesses must comply and develop identity theft prevention programs. Is your business covered? This paper clearly defines which businesses are affected, explains the key aspects of the Red Flags Rule and more.
Posted: 13 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Best Practices in Securing Your Customer Data in Salesforce, Force.com, and Chatter
sponsored by CipherCloud
WHITE PAPER: Many organizations want to move to the Salesforce platform, but concerns about data security, privacy, residency, and compliance have held them back. This whitepaper outlines best practices in securing sensitive customer data in Salesforce and outlines "must have" capabilities to overcome emerging cloud threats.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

CipherCloud

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER: Observing the complete lifecycle of vulnerability management begins with asset discovery. Learn more about the key steps for successful management with this informative resource. How can you improve your security?
Posted: 30 Jul 2012 | Published: 30 Jul 2012

Qualys

Protect citizen data with IBM Rational software
sponsored by IBM
WHITE PAPER: Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

IBM

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

LogRhythm, Inc.

Holistic risk management: Perspectives for IT professionals
sponsored by IBM
WHITE PAPER: Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Posted: 28 Jun 2012 | Published: 16 Oct 2012

IBM

Healthcare Information at Risk: Encryption is not a Panacea
sponsored by Intel
WHITE PAPER: This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Intel

Key Challenges in Risk Management: How Immediate Access to Integrated Information Can Mitigate Risk
sponsored by Sybase, an SAP company
WHITE PAPER: This white paper reveals the findings of a recent survey of senior risk and IT decision-makers in international financial institutions, exploring their current risk management capabilities and their plans for introducing integrated technologies, and examining the relationship between data management and risk mitigation in depth.
Posted: 04 Jun 2012 | Published: 30 Apr 2012

Sybase, an SAP company

Symantec Internet Security Threat Report: Trends for 2011
sponsored by Symantec Corporation
WHITE PAPER: This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Posted: 25 May 2012 | Published: 30 Apr 2012

Symantec Corporation

Supporting information technology risk management
sponsored by IBM
WHITE PAPER: Access the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions.
Posted: 04 May 2012 | Published: 01 Oct 2011

IBM

Establishing a Formal Cyber Intelligence Capability
sponsored by Verisign, Inc.
WHITE PAPER: While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
Posted: 03 May 2012 | Published: 03 May 2012

Verisign, Inc.

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

The Forrester Wave™: Risk-Based Authentication, Q1 2012
sponsored by RSA
WHITE PAPER: This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more.
Posted: 02 Apr 2012 | Published: 22 Feb 2012

RSA

Risk-Based Test Automation from a Business Process Perspective: Automating the Testing of Critical Business Processes Enables you to Manage Change More Effectively
sponsored by Worksoft
WHITE PAPER: Being able to adapt your business processes to changing environments effectively is crucial to the overall success of your business. Read this white paper to learn how SAP users can implement the best risk-based testing strategies and the right automated testing tool to accommodate change.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

Worksoft

A Prudent Approach to Risk Management
sponsored by RSA
WHITE PAPER: Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.
Posted: 23 Mar 2012 | Published: 01 Feb 2011

RSA

Counterparty Risk: Are We Leveraging Our Tools?
sponsored by Sybase, an SAP company
WHITE PAPER: While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

Sybase, an SAP company

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK
sponsored by Idera
WHITE PAPER: This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks.
Posted: 31 Jan 2012 | Published: 31 Jan 2012

Idera

The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER: In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension

Lumension Patch Management: Picking the Low-Hanging Fruit
sponsored by Lumension
WHITE PAPER: This white paper explores a centralized, comprehensive approach to application patching, allowing security pros to automatically detect risks, deploy patches and protect business information across a complex, highly distributed physical and virtual environment.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension

Managing Risk in the Cloud
sponsored by NetApp
WHITE PAPER: This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks.
Posted: 05 Jan 2012 | Published: 01 Oct 2009

NetApp

Managing the Risk of Network Changes
sponsored by RedSeal Networks
WHITE PAPER: This paper discusses the challenges of change management and offers an effective 6-stage process for managing change. In addition, discover how RedSeal can improve the efficiency and effectiveness of each stage.
Posted: 14 Dec 2011 | Published: 14 Dec 2011

RedSeal Networks

When Benefits Outweigh the Fears: Is Your Business Ready for the Cloud?
sponsored by Webroot
WHITE PAPER: Eric Johnson was a network admin at a small company of 50 or so workstations. One of the biggest problems he continuously faced was growing pains.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot
126 - 150 of 270 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement