Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis Reports
 
The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: A National Institute of Standards and Technology study found that it is 6 times more costly to fix vulnerabilities in production vs. during coding. In this white paper, gain insight into how DevSecOps is the future of software development.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Veracode, Inc.

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon

Proofpoint Threat Response
sponsored by Proofpoint, Inc.
WHITE PAPER: How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Proofpoint, Inc.

How LepideAuditor Helps You Detect and Prevent Insider Threats
sponsored by Lepide Software
EBOOK: Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

How Veracode Supports your Complete Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: Application layer attacks are now the most frequent pattern in confirmed breaches, according to Verizon. Every organization is dependent on applications – if these applications are at risk, so is the business. In this white paper uncover how to boost your application security effectively.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veracode, Inc.

GDPR Strategy Guide
sponsored by Veritas
WHITE PAPER: By reading this white paper, you will uncover important details you'll need to know to ensure you are compliance ready by May 2018.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Veritas

Anti-Virus Comparative
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Key into this white paper to uncover results from the Malware Protection Test and the Exploit Test.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

How to Create a Cybersecurity Policy for Your Organization
sponsored by HelpSystems
WHITE PAPER: Discover a 4-step plan to build a cybersecurity policy for your organization. As a bonus, uncover additional resources to create a data breach response plan.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HelpSystems

The 6 Essentials for DevOps Team Excellence
sponsored by evident.io
WHITE PAPER: A recent Enterprise Strategy Group survey found that 45% of organizations currently report having a "problematic shortage" of cybersecurity skills. Take an in-depth look at this white paper to reveal essentials that can help your enterprise form a smart framework for running a secure DevOps organization.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement