IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment White Papers (View All Report Types)
151 - 175 of 222 Matches Previous Page  |  Next Page
IT Risk Management: Guide to Software Risk Assessments and Audits
sponsored by Veracode, Inc.
WHITE PAPER: Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Veracode, Inc.

Export Compliance Management: Best Practices for Managing Export Compliance to Support Globalization and Reduce Your Risk Profile
sponsored by Management Dynamics
WHITE PAPER: Before escalating their overseas sales, companies must gauge their exporting best practices to see what can be gained from improving compliance process. This Report profiles export compliance programs in various industries to reveal key challenges companies face in managing these programs and determine how software is used in the process.
Posted: 26 May 2010 | Published: 26 May 2010

Management Dynamics

ZeuS: A Persistent Criminal Enterprise
sponsored by Trend Micro
WHITE PAPER: This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.
Posted: 11 May 2010 | Published: 24 Mar 2010

Trend Micro

GRC Strategies - Finding the Right Balance of Business and IT
sponsored by SAP America, Inc.
WHITE PAPER: This white paper demonstrates that both business and IT GRC initiatives are continuing to grow in relevance and provides key recommendations for companies seeking to transform business processes to reduce costs, improve governance and compliance, while mitigating and managing risk.
Posted: 12 Apr 2010 | Published: 12 Apr 2010

SAP America, Inc.

Four Steps to Cure Your Patch Management Headache
sponsored by Lumension
WHITE PAPER: Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.
Posted: 11 Feb 2010 | Published: 11 Feb 2010

Lumension

Reliability Analysis of the APC InfraStruXure Power System
sponsored by Schneider Electric
WHITE PAPER: The APC InfraStruXure product line offers an alternative architecture to the central UPS. This paper summarizes the key findings of MTechnology's quantitative risk assessment and discusses their implications for facility managers and designers.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Schneider Electric

Reliability Analysis of the APC Symmetra MW Power System
sponsored by Schneider Electric
WHITE PAPER: MTechnology, Inc. (MTech) performed a quantitative reliability analysis of the APC Symmetra MW UPS. The study used techniques of Probabilistic Risk Assessment (PRA) to calculate the likelihood of over 680,000 potential failure modes.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Schneider Electric

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
sponsored by Lumension
WHITE PAPER: Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Posted: 27 Jan 2010 | Published: 27 Jan 2010

Lumension

Considerations for Integrating Intelligence into Security Operations
sponsored by VeriSign EMEA
WHITE PAPER: This whitepaper outlines four critical elements of cyber security intelligence that organizations must meet to ensure that the integration of the intelligence will help improve the safety and profitability of enterprises. This paper also presents specific questions to ask when determining the best approach for an overall risk-mitigation strategy.
Posted: 23 Dec 2009 | Published: 03 Dec 2009

VeriSign EMEA

The Essentials Series: Security Information Management
sponsored by Dell SecureWorks
WHITE PAPER: This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.
Posted: 02 Dec 2009 | Published: 09 Oct 2009

Dell SecureWorks

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation
WHITE PAPER: All companies must take risks to survive, and the most successful companies are those that actively integrate risk management into their decision-making processes. This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 23 Nov 2009 | Published: 18 Feb 2009

Oracle Corporation

A Guide to the Value of Reliable Data in Retail Banking
sponsored by DataFlux Corporation
WHITE PAPER: This paper examines the impact of unreliable data on retail banks. Defining the requirements needed to guarantee data reliability in retail banking, it offers a practical approach to creating and governing that data, and shows how you can get started in making trusted data available to improve marketing, customer service, risk management and more.
Posted: 04 Nov 2009 | Published: 02 Nov 2009

DataFlux Corporation

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: Read this paper and learn how a successful data leak prevention system can protect your business from internal threats in this age of regulatory compliance, risk, and governance.
Posted: 07 Oct 2009 | Published: 15 Dec 2008

Mimecast

Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.
Posted: 10 Sep 2009 | Published: 16 Oct 2008

Oracle Corporation

Leveraging a Maturity Model to Achieve “Proactive Compliance”
sponsored by Symantec Corporation
WHITE PAPER: Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
Posted: 02 Sep 2009 | Published: 03 Aug 2009

Symantec Corporation

A Premium on Efficiency: Midsize Manufacturers Confront the Obstacles to Growth
sponsored by SAP America, Inc.
WHITE PAPER: How do best-in-class midsize manufacturers continue to grow in a tough economy? This research report, conducted by EIU, outlines measures manufacturers implement to continue expanding even while coping with the strains of softening demand in key markets, rising input costs, and downward pressure on prices.
Posted: 07 Aug 2009 | Published: 07 Aug 2009

SAP America, Inc.

The Information Governance Imperative
sponsored by RSD
WHITE PAPER: Read this paper to learn how information governance is becoming more important in today's business world and learn why your organization needs to implement an information governance strategy today and how to go about implementing one.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

RSD

The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability
sponsored by SAP America, Inc.
WHITE PAPER: Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability.
Posted: 22 Jul 2009 | Published: 03 Jun 2009

SAP America, Inc.

The Financial Close: Optimizing Performance and Driving Financial Excellence
sponsored by SAP America, Inc.
WHITE PAPER: The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls
Posted: 05 Jun 2009 | Published: 02 Jun 2009

SAP America, Inc.

A Complete View Of The Enterprise: Linking Operational And Financial Planning In Global Organizations
sponsored by SAP America, Inc.
WHITE PAPER: In February 2008, CFO Research Services, a unit of CFO Publishing and part of The Economist Group, began a research project with Business Objects, an SAP company, asking senior finance executives to give views on their priorities and challenges around integrating operational and financial planning processes.
Posted: 05 Jun 2009 | Published: 01 May 2008

SAP America, Inc.

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams
sponsored by Qualys, Inc.
WHITE PAPER: This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Qualys, Inc.

Hard Hat Area: Myths and Pitfalls of Data Mining
sponsored by SPSS Inc. Worldwide Headquarters
WHITE PAPER: The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

SPSS Inc. Worldwide Headquarters

Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER: Application security has risen to the top of the agenda for security professionals striving to control their overall risk profile. According to US Computer Emergency Response Team (US-CERT) and Gartner, 75% of new attacks target the application layer and software vulnerabilities have reached...
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Veracode, Inc.

Controlling Risk: Quality Management for SAP® Implementations and Upgrades
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper summarizes the benefits of using HP software throughout the SAP application lifecycle, while focusing primarily on ensuring a smooth implementation, upgrade and go live with SAP applications.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Hewlett-Packard Company

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation
151 - 175 of 222 Matches Previous Page    5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement