Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk Analysis Reports
 
Special Report: Cyber Security in 2015
sponsored by IBM
WHITE PAPER: This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.
Posted: 22 May 2015 | Published: 31 Mar 2015

IBM

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

Mitigating Legal and Business Risks of Cyber Breaches
sponsored by UnitedLex
WEBCAST: In this webcast, a panel of experts discuss real case studies will illuminate how legal and IT can collaborate to identify the business and legal liabilities of a cyber-security breach to help you prepare a proactive cyber risk strategy.
Posted: 30 Apr 2015 | Premiered: Apr 1, 2015

UnitedLex

The Rise in Cybercrime: A Report on the Current Threat Landscape
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM

Reduce Risk: Cisco Connected Factory Starter Kit
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to discover how this connected factory solution can help you plan, design, build, optimize, and manage your solution.
Posted: 15 May 2015 | Published: 01 Nov 2014

Cisco Systems, Inc.

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Migrate to Red Hat JBoss Middleware with Red Hat Consulting
sponsored by Red Hat
DATA SHEET: This data sheet provides a comprehensive migration platform for moving your applications or platforms while managing risks and costs and allowing for more strategic allocation of resources and investment budget. Read now to carve out IT costs and make your ecosystem more scalable and agile.
Posted: 21 May 2015 | Published: 31 Aug 2014

Red Hat

Security Reimagined
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 06 May 2015 | Published: 31 Dec 2014

FireEye

Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST: This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014

Absolute Software

Avoid Risks by Keeping Secure FTP Policies Straightforward
sponsored by IBM
EGUIDE: In this e-guide, discover why most users fail to securely transfer files and what you can do to stop their risky behavior.
Posted: 21 May 2015 | Published: 21 May 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement