IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment White Papers (View All Report Types)
51 - 75 of 414 Matches Previous Page  |  Next Page
Agile Security at the Speed of Modern Business
sponsored by CloudPassage
WHITE PAPER: An agile security solution implements orchestration and automation to keep up with diverse, fluid and fast-moving infrastructures. Learn how agile security can empower your CISO and their teams to move at the speed of modern business and become enablers of innovation and growth.
Posted: 07 Jun 2016 | Published: 01 May 2016

CloudPassage

Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale
sponsored by Anomali
WHITE PAPER: To address growing scalability issues, organizations will need to embrace a distributed computing approach to security. In addition, Threat Intelligence Platforms will need to create organizational relevance for threat intelligence data.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Anomali

An Operational Model for Breach Analytics and Intelligence
sponsored by Anomali
WHITE PAPER: In the face of this situation, a new approach to security strategy and operations must be adopted. Discover an approach that focuses on operational relevance, reducing adversary dwell time and speeding incident response activities.
Posted: 06 Jun 2016 | Published: 01 May 2016

Anomali

Find, Classify, Protect your data
sponsored by Verizon
WHITE PAPER: Understanding, identifying and classifying your data correctly are the first steps in information security. Learn how to evaluate your data landscape and create a plan to manage and secure it.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Verizon

Why Today's Phishing Attacks are Harder to Detect
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.
Posted: 06 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Encryption as an IT Service
sponsored by Gemalto
WHITE PAPER: To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

Gemalto

The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works
sponsored by HID
WHITE PAPER: In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

vanGO® One-2-One™ Personalized Security
sponsored by HID
WHITE PAPER: With several different card, hardware and software options available, designing the right solution for your organization is easy. vanGO is a total solution consisting of cards, hardware and software that work together to create a simple, secure, and cost-effective system.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

X-Force Cyber Security Intelligence Index  Report
sponsored by IBM
WHITE PAPER: It's clear no industry was immune to cyberattackers in 2015. Discover statistics from last year's cyber threat landscape and see which industries were most affected by cybercrime. Learn how to create an effective cybersecurity strategy to ensure your organizations doesn't show up on next year's report.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM

Setting new standards in cardholder data protection
sponsored by Verizon
WHITE PAPER: Learn how CartaSi implemented powerful new vulnerability scanning and penetration testing capabilities into its security process, adding new layers of defense to its customer web portals. Get Broader enhancements to data protection with the ability to monitor security-related trends across multiple portals.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Recognize and Respond to Cyber Attacks
sponsored by Verizon
WHITE PAPER: The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Build a common identity profile and hub out of disparate identity sources
sponsored by Radiant Logic, Inc.
WHITE PAPER: Discover how to renew your existing IAM investments, making them a strategic infrastructure solution that supports current identity needs and adapts quickly to future requirements as they arise.
Posted: 02 Jun 2016 | Published: 01 May 2016

Radiant Logic, Inc.

Get Help Tracking Down the Leak
sponsored by Exabeam
WHITE PAPER: Learn how to best utilize UBA and threat hunting in your security intelligence platform to proactively catch unwanted activity across your network.
Posted: 31 May 2016 | Published: 01 Apr 2016

Exabeam

Complete Data Protection - Data Sheet
sponsored by Intel Security
WHITE PAPER: With proper encryption, you can easily stop data loss and take control of all your data that lives on employee endpoints. Learn how to communicate with all your endpoints and control them from a hardware level, whether they are powered on or powered off.
Posted: 31 May 2016 | Published: 13 Apr 2016

Intel Security

In the Market for a New Key Manager? Then Get in on a Good Thing!
sponsored by Gemalto
WHITE PAPER: This white paper gives you four key reasons why you need to switch to a central key manager. Learn about a full portfolio of flexible encryption options that work on-premises, in traditional data centers and virtualized cloud environments.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gemalto

Complete Data Protection (Advanced) - Data Sheet
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Management of Native Encryption for Apple FileVault and Microsoft BitLocker
sponsored by Intel Security
WHITE PAPER: With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack. This resource can help ensure you don't end up on the data breach victim's list.
Posted: 25 May 2016 | Published: 01 Apr 2016

Intel Security

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Gemalto
WHITE PAPER: This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.
Posted: 24 May 2016 | Published: 24 May 2016

Gemalto

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Protecting Valuable Data Assets
sponsored by Intel Security
WHITE PAPER: Most organizations are aware of the results of not adequately protecting their data, ranging from regulatory penalties to the detrimental costs associated with any data breach. View today's featured resource as we reveal several solutions for protecting data while reducing cost and complexity and allowing for real-time forensic analysis.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

One Firewall Brand Decreases Complexity, Not Security
sponsored by Fortinet, Inc.
WHITE PAPER: This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

When Visibility is not Enough: Taking Control of Your Data
sponsored by Intel Security
WHITE PAPER: In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

A Powerful Platform for Cloud Security Analytics
sponsored by Exabeam
WHITE PAPER: Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam
51 - 75 of 414 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement