Business of Information Technology  >   Business Management  >   Risk Management  >   Occupational and Environmental Safety  >  

Safety-Improvement Programs

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Practices intended to constantly improve safety within a plant or across a company, including, but not limited to, safety teams, safety awareness programs and communications, safety "days," safety training, and setting of continuous-improvement goals targeting safety metrics, such as OSHA incidents or lost-workday rates.
Safety-Improvement Programs White Papers (View All Report Types)
1 - 25 of 1279 Matches Previous Page  |  Next Page
13 Global Security Consultancies That Matter Most And How They Stack Up
sponsored by IBM
WHITE PAPER: This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.
Posted: 02 Mar 2016 | Published: 29 Feb 2016


2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016


2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016


2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016


2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: No matter what your security maturity level looks like, you undoubtedly have security pressures you'd like to alleviate. This report serves as a reliable compass of where your security efforts need to be in 2016 and into the future. Learn how to not only placate the pressure, but to help make your organization more secure overall.
Posted: 30 Sep 2016 | Published: 31 Aug 2016


3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014


10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014


10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013


10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Steps to Managing Risk and Regulatory Compliance in Blogs and Wikis
sponsored by Techrigy
WHITE PAPER: Risks related to collaboration tools like blogs and wikis can create legal liability and regulatory problems. Learn how to gain competitive advantage from these community-building tools while ensuring the content in them is appropriate and secure.
Posted: 08 Oct 2007 | Published: 01 Sep 2007


10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014


2006 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
Posted: 28 Dec 2007 | Published: 01 Oct 2006


2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

2010 Information Security & Compliance Trend Study
sponsored by nCircle
WHITE PAPER: This report summarizes the results of the nCircle 2010 Information Security and Compliance Trend Study, a cross-industry survey of over 250 respondents in the IT security industry in the United States and Canada. Over 65% of survey respondents are from large and midsize enterprises.
Posted: 02 Aug 2010 | Published: 02 Aug 2010


2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013


2016 Neustar DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.
Posted: 29 Sep 2016 | Published: 30 Apr 2016


2016 Security Operations Center Report
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016


3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

3 Major Challenges to Securing Your Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: This report addresses the top 3 major security challenges as your organization moves into the cloud. Gain an overview of strategies for protecting your data and network.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

3 Strategies to Protect Endpoints from Risky Applications
sponsored by Lumension
WHITE PAPER: Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.
Posted: 10 Sep 2010 | Published: 10 Sep 2010


3 Ways a N.Y. Hospital Saw Its Workflows Reprogrammed
sponsored by McKesson Corporation
WHITE PAPER: This whitepaper considers how one New York hospital re-evaluated their communication workflows, and shares their improvements. Read on to see how software is reshaping the industry, and how your organization could see similar results.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

McKesson Corporation
1 - 25 of 1279 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement