Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis Reports
Bolster Your Enterprise Risk Management with Network-wide Protection
sponsored by Palo Alto Networks
CASE STUDY: In this case study, you will examine how Tennis Australia was able to implement next-generation firewall technology to seamlessly identify and prevent potential threats to their wide area network (WAN). Access this study now to learn how to deploy intrusion prevention.
Posted: 16 Oct 2015 | Published: 18 May 2013

Palo Alto Networks

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology, and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Posted: 23 Oct 2015 | Published: 20 Jul 2015

Intel Security

Internal Segmentation Firewall: Protecting Your Network from the Inside Out
sponsored by Fortinet, Inc.
WHITE PAPER: In this brief white paper, you will discover if an internal segmentation firewall is the best form of protection for your users and applications. Learn how to enforce more granular security with policy-based segmentation, and contain threats by user, device, and application.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Fortinet, Inc.

Why Security Operations Centers are the Key to the Future
sponsored by IBM
EGUIDE: This expert guide explains what a security operations center is and why it's essential for effective threat detection.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015


Case Study: Securing PCI Data in a Decentralized Network
sponsored by Identity Finder, LLC
WHITE PAPER: This white paper discusses the issues surrounding PCI security and compliance and presents an in-depth case study of a hotel that overcame these challenges.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

Best Practices for Strong Cyber Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.
Posted: 20 Nov 2015 | Published: 30 Sep 2015

Hewlett Packard Enterprise

Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

Choosing Security You Know You Can Trust
sponsored by BitDefender
VIDEO: In this video, an enterprise CEO discusses the importance of trustworthy cybersecurity and what that means for his organization. Take a look to learn how you can select a security system you can trust to stop today's powerful attacks.
Posted: 28 Oct 2015 | Premiered: 07 Oct 2015


Don't Wait Until Next Year to Build Better Defenses
sponsored by Intel Security
WHITE PAPER: This infographic discusses how you can implement endpoint security that's suitable for today's advanced targeted attacks.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Intel Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement