Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis Reports
Protect Against Threat Propagation and Damage in the Internal Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines how to add an additional security layer to your network with an internal segmentation firewall. Learn how to segment the access of potential threats vectors to critical resources, and limit potential breach damage in your internal network.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

Fortinet, Inc.

Leverage the Global Threat Community to Prevent Unknown Threats with the Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, you will discover how to reduce your attack surface and block all known and unknown threats with a threat intelligence cloud platform. Access this advice now to detect unknown threats and convert them into known, stoppable threats.
Posted: 15 Oct 2015 | Published: 15 Oct 2015

Palo Alto Networks

Managing the Insider Threat with Active Directory Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper discusses the dangers malicious actors pose to Active Directory and gives suggestions for AD security best practices.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Dell, Inc.

SIEMplifying Security Monitoring for SMBs
sponsored by AlienVault
WHITE PAPER: This white paper discusses the unique SIEM challenges SMBs face. Access this resource now to learn how you can get the most out of your SIEM despite limited resources.
Posted: 22 Oct 2015 | Published: 22 Oct 2015


Special Report: Incident Response Capabilities Needed
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The SANS 2015 survey of the incident response capabilities found both good news and bad news. Read on to discover what the survey found and what those results mean for your organization.
Posted: 24 Nov 2015 | Published: 31 Aug 2015

Hewlett Packard Enterprise

Discovering the New Business Case for Cybersecurity
sponsored by Symantec Corporation
WEBCAST: This presentation demonstrates how cyber security creates wealth for stakeholders and justifies the investments that need to be made towards it. Learn how security can enable your digital information to have functional and economic value as property and can help you manage the risk of any potential threat or attack on your information.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

The Total Economic Impact of Comprehensive Security
sponsored by Alert Logic
WHITE PAPER: This white paper analyzes the TEI and ROI for one suite of security solutions and discusses how you can get the most out of your security spending.
Posted: 28 Oct 2015 | Published: 31 Dec 2014

Alert Logic

Navigate The Future Of Identity And Access Management
sponsored by Covisint
WHITE PAPER: In this Forrester Report, discover analysts' revelations about how to support new initiatives in an increasingly competitive business environment with superior security.
Posted: 08 Oct 2015 | Published: 03 Aug 2015

Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Deploying a Next-Gen Platform for Managed Security Service Providers (MSSP)
sponsored by Palo Alto Networks
CASE STUDY: This case study explains how to reduce your security operating expenses by 50% by upgrading your network security services into the cloud. Learn how to onboard customers seamlessly and deliver faster service for your customers.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Palo Alto Networks
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement