IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing Risk Reports
 
Conquering Threats With User Behavior Analytics
sponsored by Interset Software Inc.
WHITE PAPER: This e-guide introduces user behavioral analytics tools that can help you determine what features you should consider before making a purchase. Read on to review both deployment strategies and reasonable performance expectations.
Posted: 19 Jan 2016 | Published: 16 Dec 2015

Interset Software Inc.

Business risks of software vulnerabilities
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Access this valuable white paper now to learn how to protect your high-value assets and provide scalable, cost-effective, integrated security across your entire IT environment.
Posted: 22 Dec 2014 | Published: 08 Jan 2014

IBM

Advanced Threat Defense
sponsored by Blue Coat Systems
EGUIDE: This e-guide will teach you the steps your business should take to protect against new, more advanced threats.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Proactive Incident Response: Prepare Now or Pay Later
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will show you statics of cybercrime and give you tactics to proactively deter attackers.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: This webcast gives you solutions for business infrastructure virtualization that enable IT organizations to energize businesses of all sizes.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Compensating Security Controls for Windows Server 2003 Security
sponsored by TrendMicro
WHITE PAPER: This white paper shows you a solution while you're in the process of migration. Learn how you can get network, system and anti-malware security controls across physical, virtual and cloud systems running W2K3.
Posted: 04 Feb 2016 | Published: 31 May 2015


Virtual Desktop Security: Exploring VDI Features
sponsored by Dell
EGUIDE: This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
Posted: 10 Feb 2016 | Published: 02 Feb 2016

Dell

Prioritizing Security at management and board levels
sponsored by Cisco
WHITE PAPER: This white paper analyzes the IT security capabilities in the UK.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Cisco

Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement