IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentWhite Papers (View All Report Types)
151 - 175 of 190 Matches Previous Page  | Next Page
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects
sponsored by HCL Technologies Ltd.
WHITE PAPER: This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool.
Posted: 20 Jun 2008 | Published: 13 Mar 2008

HCL Technologies Ltd.

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk
sponsored by IBM Line of Business
WHITE PAPER: Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price.
Posted: 12 Jun 2008 | Published: 01 Apr 2007

IBM Line of Business

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER: This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007

IBM

Airspace Risk Assessment
sponsored by AirTight Networks, Inc.
WHITE PAPER: This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates.
Posted: 25 Apr 2008 | Published: 01 Apr 2008

Pitney Bowes Group 1 Software

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention is a confusing market, but by understanding the capabilities of DLP tools you can choose an appropriate tool. This report will provide the necessary background in DLP to help you find the best match for your organization.
Posted: 03 Apr 2008 | Published: 03 Apr 2008

Websense, Inc.

Enterprise Time and Attendance - Build Vs. Buy
sponsored by Infor
WHITE PAPER: Explore the advantages, disadvantages, costs and risks of buying and building an enterprise time and attendance solution.
Posted: 19 Mar 2008 | Published: 01 Jan 2007

Infor

Preparation by Automation: Reducing the Cost, Pain, Time, and Risk of IT Security Audits
sponsored by TraceSecurity
WHITE PAPER: This white paper explains how IT organizations can use automation to better prepare themselves for IT security audits, thereby significantly reducing the cost, pain, time, and risk associated with them.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

TraceSecurity

Best Practices in Data Management
sponsored by SAS
WHITE PAPER: The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM.
Posted: 06 Mar 2008 | Published: 01 Jan 2007

SAS

Asset: Healthcare 2015 and U.S. Health Plans New Roles, New Competencies
sponsored by IBM Line of Business
WHITE PAPER: The U.S. healthcare system is on an unsustainable path that will force its transformation.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

IBM Line of Business

Tuning ERP and the Supply Chain for Profitable Growth
sponsored by Epicor Software Corporation
WHITE PAPER: Some of the biggest opportunities exist in the supply chain and globalization. This Ventana Research white paper explores how you can improve business performance by addressing opportunities and risks within your supply chain and ERP systems.
Posted: 21 Feb 2008 | Published: 01 Jan 2007

Epicor Software Corporation

Understanding and Detecting Malware Threats Based on File Size
sponsored by Fortinet, Inc.
WHITE PAPER: Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Log Management Best Practices
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA, The Security Division of EMC

PC on a Stick: A Portable Endpoint Security Nightmare
sponsored by Lumension
WHITE PAPER: Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns.
Posted: 07 Feb 2008 | Published: 01 Jan 2007

Lumension

Increase Productivity and Reduce Security Risks for Teleworkers
sponsored by SonicWALL
WHITE PAPER: This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
Posted: 23 Jan 2008 | Published: 22 Jan 2008

SonicWALL

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Data Risk Management Solutions
sponsored by IBM Software Group
WHITE PAPER: This white paper details the benefits of effectively calculating and quantifying risk to data within an organization, highlighting a holistic approach to monitoring, measuring and managing data risk and compliance.
Posted: 27 Nov 2007 | Published: 01 May 2007

IBM Software Group

Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
sponsored by SonicWALL
WHITE PAPER: SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Understanding the Real Risk for Asset Intensive Industries: Demystifying the Myths
sponsored by IBM/MRO
WHITE PAPER: There are common misconceptions about the value and deployment of ERP solutions in asset-intensive industries. This white paper demystifies the myths so decision makers in these asset-intensive industries can better understand what the real risk is.
Posted: 10 Aug 2007 | Published: 01 Apr 2007

IBM/MRO

Extend Business Reach with a Robust Security Infrastructure
sponsored by IBM Software Group
WHITE PAPER: This white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.
Posted: 03 Aug 2007 | Published: 01 Jul 2007

IBM Software Group

The High Stakes of Security: Protecting Your Brand
sponsored by IBM Software Group
WHITE PAPER: This white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization...
Posted: 26 Jul 2007 | Published: 01 Dec 2006

IBM Software Group
151 - 175 of 190 Matches Previous Page    5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement