IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing Risk Reports
Presentation Transcript: Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters
sponsored by Commvault
WHITE PAPER: Check out this transcript to learn how you can avoid the data apocalypse. You'll get advice and insight from 2 experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.
Posted: 03 Jul 2014 | Published: 03 Jul 2014


Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

Optimized Sourcing in Hybrid IT Environments: Impacts and Improvements
sponsored by IBM
WHITE PAPER: This research paper discusses how hundreds of organizations feel about multiple-sourced hybrid IT, how to predict upcoming service needs, and how to manage IT acquisition in a way that will optimize environments.
Posted: 01 Sep 2015 | Published: 30 Apr 2014


Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Enterprise
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Enterprise

Bolstering Your Enterprise Mobility Security Strategy for Today's App Landscape
sponsored by Oracle Corporation
WHITE PAPER: This quick and easy guide outlines the benefits of employing enterprise mobility management (EMM) in your organization, and also highlights the particular risks facing BYOD users in the mobile app landscape.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Oracle Corporation

Faster Speed-to-Market Through Secure Information Sharing
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how to securely manage file systems and reduce complexity. Read on now to learn how to simplify data sharing with partners without the risk of data loss.
Posted: 28 Apr 2015 | Published: 04 Dec 2013

IntraLinks, Inc

How to Provide Secure Application Access and Improve Network Performance
sponsored by Palo Alto Networks
CASE STUDY: In this case study, learn how the University of Adelaide transformed their non-scalable network security system by deploying next-generation firewall technology, offering granular visibility of threats and better control of Internet applications.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Palo Alto Networks

Maximize ROI by Deploying Strategic Partners in UC&C
sponsored by Polycom, Inc.
WHITE PAPER: In this white paper, you will learn how to minimize deployment risk, while providing IT leaders with a rock-solid deployment with minimal challenges. Learn how to integrate your existing UC infrastructure with potential new voice/video vendors, as well as how to strategize with your partners and leverage your relationship with them.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Polycom, Inc.

Cost of a Breach Rising; How to Protect Against It
sponsored by TaaSera
EGUIDE: This expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
Posted: 01 Dec 2014 | Published: 01 Dec 2014


Are you minding your business's reputation? What can you do to mind it better?
sponsored by IBM
WEBCAST: Changing social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.
Posted: 14 Mar 2014 | Premiered: May 22, 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement