Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis Reports
 
Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility
sponsored by TrendMicro
WHITE PAPER: See how security pros and decision makers are responding to the increased frequency, volume and ferocity of today's cyber threats to endpoint devices. Discover what realizations they've come to about their own security tools and posture and learn just how inadequate your current threat protection most likely is.
Posted: 11 Nov 2016 | Published: 31 Oct 2016

TrendMicro

Beyond your company boundaries
sponsored by ComputerWeekly.com
PRESENTATION: Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

ComputerWeekly.com

How LepideAuditor Helps You Detect and Prevent Insider Threats
sponsored by Lepide Software
EBOOK: Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

When Downtime Takes a Bite out of Your Budget
sponsored by Globalscape
EBOOK: Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Resource Center: How to Safeguard Data
sponsored by McAfee, Inc.
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

McAfee, Inc.

Software Asset Management: Critical for Mitigating Non-Compliance Risks
sponsored by Flexera Software
WHITE PAPER: This IDC white paper defines software asset management and emphasizes the factors driving its importance. Uncover best practices for mitigating the risks of inefficient software portfolio management and addressing 3 key priorities, namely app security, cost management, and quality of service.
Posted: 16 Jun 2017 | Published: 28 Feb 2017

Flexera Software

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Risk Assessment: The Roles Vendors and Frameworks Play
sponsored by BitSight
EGUIDE: Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.
Posted: 23 Feb 2017 | Published: 15 Feb 2017

BitSight

DraftKings Replaces Traditional Antivirus with Next-Gen AV (NGAV)
sponsored by Carbon Black
RESOURCE: Discover how DraftKings went about finding a comprehensive next-generation antivirus solution that wouldn't impact business operations. While DraftKings evaluated over 100 different providers, only one allowed them to continue working as normal, while protecting their network in the background.
Posted: 28 Oct 2016 | Published: 25 Oct 2016

Carbon Black

How are Banks Fighting the War on Fraud
sponsored by Neustar
WHITE PAPER: Discover how banks are fighting fraud, the amount of import they put on fraud and what they deem are the biggest impacts of fraud on their organization. Learn what to look for in an anti-fraud solution to balance security and customer convenience perfectly.
Posted: 03 Oct 2016 | Published: 31 Dec 2014

Neustar
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement