Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk AnalysisReports
 
Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: This resource discusses compliance issues and security gaps, explains how these can affect your organization, and how implementing a positive security solution can close the gaps.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Bit9 + Carbon Black

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 13 Aug 2014 | Published: 25 Jul 2014

BlackBerry

Protecting Digitalized Assets in Healthcare: Which Managed File Transfer Deployment Model is Right for You?
sponsored by GlobalScape
WHITE PAPER: Learn what types of policies and tools can be implemented to secure valuable healthcare data.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Is Your Business Safe from Malware and Targeted Attacks?
sponsored by Imperva
WHITE PAPER: Is your business safe from malware and targeted attacks? Access this informative chart to learn the 7 stages of targeted attack as well as the 8 steps to safeguard your organization from attack.
Posted: 11 Jul 2014 | Published: 09 Jul 2014

Imperva

Firms Turn To Next-Generation Firewalls To Tackle Evolving IT Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper summarizes a number of insights on current security challenges for enterprises and the ways that next-generation firewalls (NGFWs) are being applied as a solution.
Posted: 28 Jul 2014 | Published: 30 Apr 2014

Fortinet, Inc.

Managing the Software Supply Chain
sponsored by IBM
WHITE PAPER: Find out how your organization should address the risk in managing the software supply chain.
Posted: 07 Aug 2014 | Published: 30 Sep 2013

IBM

Harnessing the tyranny of autonomy: the Dropbox problem and the manager’s dilemma
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to discover whether your employees should be able to share information that improves productivity, or if it should be tightly controlled for privacy and security purposes
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IntraLinks, Inc

Protecting Organizations Against Advanced Persistent Threats
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Penetration Testing From Your Pocket: New Mobile Testing Tools
sponsored by Pwine Express
WEBCAST: In this in-depth webcast, you'll discover a new mobile penetration testing solution that could help on-the-road pen-testers and on-site security assessments.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Pwine Express

Presentation Transcript: Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters
sponsored by CommVault Systems, Inc.
WHITE PAPER: Check out this transcript to learn how you can avoid the data apocalypse. You'll get advice and insight from 2 experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

CommVault Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement