IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentWhite Papers (View All Report Types)
126 - 150 of 183 Matches Previous Page  | Next Page
Leveraging a Maturity Model to Achieve “Proactive Compliance”
sponsored by Symantec Corporation
WHITE PAPER: Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
Posted: 02 Sep 2009 | Published: 03 Aug 2009

Symantec Corporation

A Premium on Efficiency: Midsize Manufacturers Confront the Obstacles to Growth
sponsored by SAP America, Inc.
WHITE PAPER: How do best-in-class midsize manufacturers continue to grow in a tough economy? This research report, conducted by EIU, outlines measures manufacturers implement to continue expanding even while coping with the strains of softening demand in key markets, rising input costs, and downward pressure on prices.
Posted: 07 Aug 2009 | Published: 07 Aug 2009

SAP America, Inc.

The Information Governance Imperative
sponsored by RSD
WHITE PAPER: Read this paper to learn how information governance is becoming more important in today's business world and learn why your organization needs to implement an information governance strategy today and how to go about implementing one.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

RSD

The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability
sponsored by SAP America, Inc.
WHITE PAPER: Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability.
Posted: 22 Jul 2009 | Published: 03 Jun 2009

SAP America, Inc.

The Financial Close: Optimizing Performance and Driving Financial Excellence
sponsored by SAP America, Inc.
WHITE PAPER: The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls
Posted: 05 Jun 2009 | Published: 02 Jun 2009

SAP America, Inc.

A Complete View Of The Enterprise: Linking Operational And Financial Planning In Global Organizations
sponsored by SAP America, Inc.
WHITE PAPER: In February 2008, CFO Research Services, a unit of CFO Publishing and part of The Economist Group, began a research project with Business Objects, an SAP company, asking senior finance executives to give views on their priorities and challenges around integrating operational and financial planning processes.
Posted: 05 Jun 2009 | Published: 01 May 2008

SAP America, Inc.

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams
sponsored by Qualys, Inc.
WHITE PAPER: This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Qualys, Inc.

Hard Hat Area: Myths and Pitfalls of Data Mining
sponsored by SPSS Inc. Worldwide Headquarters
WHITE PAPER: The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

SPSS Inc. Worldwide Headquarters

Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER: Application security has risen to the top of the agenda for security professionals striving to control their overall risk profile. According to US Computer Emergency Response Team (US-CERT) and Gartner, 75% of new attacks target the application layer and software vulnerabilities have reached...
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Veracode, Inc.

Controlling Risk: Quality Management for SAP® Implementations and Upgrades
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper summarizes the benefits of using HP software throughout the SAP application lifecycle, while focusing primarily on ensuring a smooth implementation, upgrade and go live with SAP applications.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Hewlett-Packard Company

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation

Monitoring for SAP: High-Risk Financial Transactions in Real Time
sponsored by Security Weaver
WHITE PAPER: For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP.
Posted: 24 Sep 2008 | Published: 06 Feb 2009

Security Weaver

IBM System x Servers - The Right Choice. Open. Easy. Green
sponsored by IBM
WHITE PAPER: IBMSystemx is a portfolio of robust servers built on IBMX-Architecture's our blueprint for bringing innovation tox86systems. Innovation that helps set you apart from the competition. Learn more in this paper.
Posted: 11 Sep 2008 | Published: 11 Sep 2008

IBM

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance
sponsored by Varonis
WHITE PAPER: This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Varonis

Distributed Capture Platforms: Reducing Costs, Removing Bottlenecks and Mitigating Risks
sponsored by EMC Corporation
WHITE PAPER: Remote workforces are a growing trend that has documentation implications on your business processes. This paper explores that, placing special emphasis on a distributed capture strategy for resolving remote workforce-related issues.
Posted: 21 Aug 2008 | Published: 15 Aug 2008

EMC Corporation

Tactical Management of Agile Development: Achieving Competitive Advantage
sponsored by Rally Software
WHITE PAPER: This white paper is an invaluable Agile development overview full of techniques, best practices and educational materials. Created specifically for people involved in Software Release Planning, Project Management, Defining Features, Req...
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Rally Software

Offshore Software Test Automation: A Strategic Approach to Cost and Speed Effectiveness
sponsored by LogiGear Corporation
WHITE PAPER: This white paper presents an overview of an innovative approach to integrating global resourcing and the latest test automation tools. It also explores the software development and testing process, global resourcing and the automation of software testing.
Posted: 04 Aug 2008 | Published: 01 Jan 2006

LogiGear Corporation

The Total Economic Impact of Lumension Security's Sanctuary
sponsored by Lumension
WHITE PAPER: Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated
Posted: 10 Jul 2008 | Published: 10 Sep 2007

Lumension

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects
sponsored by HCL Technologies Ltd.
WHITE PAPER: This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool.
Posted: 20 Jun 2008 | Published: 13 Mar 2008

HCL Technologies Ltd.

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk
sponsored by IBM Line of Business
WHITE PAPER: Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price.
Posted: 12 Jun 2008 | Published: 01 Apr 2007

IBM Line of Business

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER: This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007

IBM

Airspace Risk Assessment
sponsored by AirTight Networks, Inc.
WHITE PAPER: This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates.
Posted: 25 Apr 2008 | Published: 01 Apr 2008

Pitney Bowes Group 1 Software
126 - 150 of 183 Matches Previous Page    4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement