Business of Information Technology  >   Business Management  >   Risk Management  >   Public Health Emergencies  >  

Severe Acute Respiratory Syndrome

RSS Feed    Add to Google    Add to My Yahoo!
Severe Acute Respiratory Syndrome White Papers (View All Report Types)
 
Preparing the Enterprise for a Pandemic
sponsored by Avaya Inc.
WHITE PAPER: This article suggests that enterprises need to look externally as much as internally to understand the impact a pandemic might have, and to prepare an appropriate response.
Posted: 09 Jun 2008 | Published: 01 Sep 2006

Avaya Inc.

Capturing Opportunity in a World of Dynamic Security Threats
sponsored by Webroot
WHITE PAPER: This white paper discusses the opportunity that today's cybersecurity challenges present to solution providers and explains why finding the right security partner is essential for capitalizing on it.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Webroot

Addressing Liquidity and Solvency Risk
sponsored by IBM
WHITE PAPER: In this white paper, learn more about how different industries are responding to these changes. This survey unlocks some of the key differences in the industry, and what that could mean for your business.
Posted: 22 Aug 2015 | Published: 22 Aug 2015

IBM

4 Dynamic Fundamentals of Portfolio Management
sponsored by Rally Software
WHITE PAPER: This white paper highlights the 4 fundamentals of successful portfolio management practice as listed above, helping you adapt to internal and external changes, take informed risks, and make the right trade-off decisions for your adaptive enterprise.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

Rally Software

Modernize your Enterprise with Effective Big Data Analytics Strategies
sponsored by TIBCO Software Inc.
WHITE PAPER: This brief white paper invites you to explore innovative business models and use cases made possible by big data analytics and management.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

TIBCO Software Inc.

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Actionable Threat Intelligence for Healthcare Organizations
sponsored by BrightPoint Security
WHITE PAPER: This white paper examines the challenge of healthcare security and discusses how you can obtain threat intelligence that solves many of these challenges.
Posted: 02 Sep 2015 | Published: 02 Jun 2015

BrightPoint Security

Best Practices for Threat & Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses what you can do to adapt your vulnerability management to the modern threat landscape.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Core Security Technologies

Optimized Sourcing in Hybrid IT Environments: Impacts and Improvements
sponsored by IBM
WHITE PAPER: This white paper explains how multiple-sourced, hybrid IT and business reality is developing and accelerating. Read on to find out how to manage your hybrid IT environment, as well as to engage third-party research that will assess sourcing services for your organization.
Posted: 01 Sep 2015 | Published: 30 Apr 2014

IBM

The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement