IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentWhite Papers (View All Report Types)
151 - 175 of 195 Matches Previous Page  | Next Page
How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance
sponsored by Varonis
WHITE PAPER: This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Varonis

Distributed Capture Platforms: Reducing Costs, Removing Bottlenecks and Mitigating Risks
sponsored by EMC Corporation
WHITE PAPER: Remote workforces are a growing trend that has documentation implications on your business processes. This paper explores that, placing special emphasis on a distributed capture strategy for resolving remote workforce-related issues.
Posted: 21 Aug 2008 | Published: 15 Aug 2008

EMC Corporation

Tactical Management of Agile Development: Achieving Competitive Advantage
sponsored by Rally Software
WHITE PAPER: This white paper is an invaluable Agile development overview full of techniques, best practices and educational materials. Created specifically for people involved in Software Release Planning, Project Management, Defining Features, Req...
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Rally Software

Offshore Software Test Automation: A Strategic Approach to Cost and Speed Effectiveness
sponsored by LogiGear Corporation
WHITE PAPER: This white paper presents an overview of an innovative approach to integrating global resourcing and the latest test automation tools. It also explores the software development and testing process, global resourcing and the automation of software testing.
Posted: 04 Aug 2008 | Published: 01 Jan 2006

LogiGear Corporation

The Total Economic Impact of Lumension Security's Sanctuary
sponsored by Lumension
WHITE PAPER: Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated
Posted: 10 Jul 2008 | Published: 10 Sep 2007

Lumension

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects
sponsored by HCL Technologies Ltd.
WHITE PAPER: This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool.
Posted: 20 Jun 2008 | Published: 13 Mar 2008

HCL Technologies Ltd.

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk
sponsored by IBM Line of Business
WHITE PAPER: Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price.
Posted: 12 Jun 2008 | Published: 01 Apr 2007

IBM Line of Business

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER: This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007

IBM

Airspace Risk Assessment
sponsored by AirTight Networks, Inc.
WHITE PAPER: This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates.
Posted: 25 Apr 2008 | Published: 01 Apr 2008

Pitney Bowes Group 1 Software

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention is a confusing market, but by understanding the capabilities of DLP tools you can choose an appropriate tool. This report will provide the necessary background in DLP to help you find the best match for your organization.
Posted: 03 Apr 2008 | Published: 03 Apr 2008

Websense, Inc.

Enterprise Time and Attendance - Build Vs. Buy
sponsored by Infor
WHITE PAPER: Explore the advantages, disadvantages, costs and risks of buying and building an enterprise time and attendance solution.
Posted: 19 Mar 2008 | Published: 01 Jan 2007

Infor

Preparation by Automation: Reducing the Cost, Pain, Time, and Risk of IT Security Audits
sponsored by TraceSecurity
WHITE PAPER: This white paper explains how IT organizations can use automation to better prepare themselves for IT security audits, thereby significantly reducing the cost, pain, time, and risk associated with them.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

TraceSecurity

Best Practices in Data Management
sponsored by SAS
WHITE PAPER: The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM.
Posted: 06 Mar 2008 | Published: 01 Jan 2007

SAS

Asset: Healthcare 2015 and U.S. Health Plans New Roles, New Competencies
sponsored by IBM Line of Business
WHITE PAPER: The U.S. healthcare system is on an unsustainable path that will force its transformation.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

IBM Line of Business

Tuning ERP and the Supply Chain for Profitable Growth
sponsored by Epicor Software Corporation
WHITE PAPER: Some of the biggest opportunities exist in the supply chain and globalization. This Ventana Research white paper explores how you can improve business performance by addressing opportunities and risks within your supply chain and ERP systems.
Posted: 21 Feb 2008 | Published: 01 Jan 2007

Epicor Software Corporation

Understanding and Detecting Malware Threats Based on File Size
sponsored by Fortinet, Inc.
WHITE PAPER: Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Log Management Best Practices
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA, The Security Division of EMC

PC on a Stick: A Portable Endpoint Security Nightmare
sponsored by Lumension
WHITE PAPER: Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns.
Posted: 07 Feb 2008 | Published: 01 Jan 2007

Lumension

Increase Productivity and Reduce Security Risks for Teleworkers
sponsored by SonicWALL
WHITE PAPER: This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
Posted: 23 Jan 2008 | Published: 22 Jan 2008

SonicWALL

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM
151 - 175 of 195 Matches Previous Page    5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement