IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing RiskReports
 
How threat intelligence can give enterprise security the upper hand
sponsored by IBM
EGUIDE: In this e-guide, expert Nick Lewis, information security officer at Saint Louis University, covers the benefits of a threat intelligence strategy for enterprises, as well as how to integrate intel feeds with existing security programs.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Mastering Risk with Business Forecasting
sponsored by IBM
WHITE PAPER: The following white paper provides readers with an overview of the current state of risk management and introduces a 4-step program for incorporating risk into your business forecasting. Learn how by doing so you can mitigate any downside potential and exploit any upside potential inherent in a situation.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IBM

Put Security on the Agenda: Aligning IT Security with Business Goals
sponsored by Kaspersky Lab
WHITE PAPER: Read this in-depth guide to discover new integrated systems management and mobile device management solutions that could help your organization enhance its existing security plan.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

Securing Your Company - Where Do You Start?
sponsored by NEC Corporation of America
PRESENTATION TRANSCRIPT: In this helpful resource, hear from the experts as they examine the best practices and strategies for effectively protecting your enterprise data safe from attackers without compromising any other aspects of the business.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

NEC Corporation of America

Transitioning from Log Management and SIEM to Comprehensive Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper discusses how security intelligence addresses these shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies— to maintain comprehensive and cost-effective information security. It will show how security intelligence addresses critical concerns in five key areas.
Posted: 31 Jul 2014 | Published: 31 Jan 2013

IBM

Ponemon Report: The Real Cost of Cyber Crime in 2013
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this Poenmon study to discover the average cost to businesses of cyber crime, and how organizations can take steps to reduce security risks and costs.
Posted: 22 Aug 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

Are you minding your business's reputation? What can you do to mind it better?
sponsored by IBM
WEBCAST: Changing social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.
Posted: 14 Mar 2014 | Premiered: May 22, 2013

IBM

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Rentokil Initial Improves Software Asset Management
sponsored by Flexera Software
CASE STUDY: Rentokil Initial, one of the largest business services companies in the world, was struggling with managing their software assets. In this case study, find out how Rentokil was able to implement a mature software asset management process and gain complete control over their software licenses, for reduced costs and lower risk.
Posted: 18 Oct 2013 | Published: 31 Oct 2011

Flexera Software

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement