IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment White Papers (View All Report Types)
26 - 50 of 227 Matches Previous Page  |  Next Page
3 Step Guide for IT Governance & Compliance
sponsored by Dell Software
WHITE PAPER: This white paper details the three critical steps for maintaining compliance with external regulations and internal security policies. Read on to learn the four key external regulations to consider when preparing an IT compliance audit. Read on to learn more.
Posted: 23 Feb 2015 | Published: 13 Dec 2012

Dell Software

Does Your Planning & Forecasting Consider Risk? It Should.
sponsored by IBM
WHITE PAPER: Incorporating risk information into the planning process you can reduce risk and include both risk and performance metrics in your measures and incentives.This white paper explains why Risk-Adjusted Planning should be a goal for your organization. Create a culture that embraces risk management as a chance to optimize performance.
Posted: 11 Feb 2015 | Published: 13 May 2011

IBM

Key Considerations in Moving to Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Why Attack Intelligence Matters
sponsored by Core Security Technologies
WHITE PAPER: Continue on to this informative white paper to learn how attack intelligence can analyze your vulnerability data, security events, and configuration data to give you a concise view of the attack paths to your most critical data.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Attack Intelligence: The Key to Reducing Risk in Healthcare
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper will show how attack intelligence can help you stay in compliance with HIPAA when it comes to risk management.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Cloud Infrastructure Security: It's Time to Rethink Your Strategy
sponsored by CloudPassage
WHITE PAPER: This white paper discusses why, in order to truly reap the benefits of the cloud, leaders need to rethink their approach to infrastructure security.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

CloudPassage

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This white paper describes how you can implement an endpoint management program that ensures optimal security through complete control and network-wide visibility.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: In this paper, SANS discusses how the layered model is more relevant than ever and how a layered approach to security provides better protection of your organization's IT assets.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
sponsored by CA Technologies.
WHITE PAPER: In this in-depth report, explore new authentication security solutions that can eliminate weak password files and end the storage of passwords on the server – meaning there are no credentials for cyber criminals to steal.
Posted: 25 Sep 2014 | Published: 31 Aug 2014

CA Technologies.

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Mitigating IT Risk for Financial Risk Analytics
sponsored by IBM
WHITE PAPER: This white paper explores the need for a high performance IT infrastructure to assist risk analytics.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

IBM

The Definitive Guide to Establishing A Security Operation Center
sponsored by AlienVault
WHITE PAPER: In this informative white paper, discover how establishing a security operations center (SOC) can enable your organization to develop a fast, coordinated, and effective response to any and all cyber threats.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

AlienVault

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 28 Jul 2014 | Published: 25 Jun 2014

IBM

Presentation Transcript: Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters
sponsored by Commvault
WHITE PAPER: Check out this transcript to learn how you can avoid the data apocalypse. You'll get advice and insight from 2 experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Commvault

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013

IBM

CIO's Guide to Managing Cloud Adoption and Risk
sponsored by SkyHigh
WHITE PAPER: This whitepaper details how to handle shadow IT by taking the right approach to risk management in the cloud.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

SkyHigh
26 - 50 of 227 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement