Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis Reports
 
Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Imaging and Printing: Is Your Valuable Data Protected?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

Justifying Investments in Information Governance
sponsored by OpenText
WHITE PAPER: Learn about the added costs of not committing to information governance, including storage management, e-discovery, and risk management.
Posted: 19 Dec 2014 | Published: 31 Dec 2011

OpenText

A dangerous business? Enterprise risk forecasting
sponsored by IPL
WHITE PAPER: The following white paper will explore the common issues with risk assessment and how predictive KRIs may offer a solid solution. Learn how this technology works, what benefits they bring into the enterprise and more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

IPL

5 Secrets and 2 Gotchas of Vulnerability Scanning
sponsored by Risk IO
WHITE PAPER: IT security is the unsung hero of your organization. They stay on top of threats, attacks, and potential exploits to keep you and your company safe every day.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Risk IO

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Information-Driven Financial Services, Big Data and the Enterprise Data Hub
sponsored by Cloudera
WHITE PAPER: Find out how financial services firms are tackling the challenge of neutralizing inbound pressures and threats in order to gain opportunities from big data.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Cloudera

Identity and Access Management Guidelines
sponsored by ObserveIT
EGUIDE: In this expert guide, Forrester Principal Analyst Andras Cser introduces an effective, easy-to-use maturity model that will enable you to evaluate your enterprise's IAM strategy and infrastructure, and Nilesh Shirke lists a number of best practices for IAM solution implementation.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

ObserveIT

Improve Enterprise Security in the Age of Cloud and Mobile Computing
sponsored by Box
WHITE PAPER: This exclusive white paper offers up a security approach that can protect your data in the age of the cloud and mobile computing.
Posted: 07 Jan 2015 | Published: 06 Mar 2014

Box

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014

TechTarget
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement