Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk Management Reports
 
IBM Security Guardium Vulnerability Assessment
sponsored by IBM
WHITE PAPER: This white paper teaches you how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Access now to identify exploitable security holes in your database.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM

How are today's CISO's transforming their security strategy?
sponsored by IBM
WHITE PAPER: This report outlines how CISOs are stepping up cybersecurity efforts to focus on addressing one of the most prevalent underlying issues globally - a programmatic focus on compliance instead of risk-based outcomes. Access now to learn what strategies security leaders are using to transform their organizations.
Posted: 05 May 2016 | Published: 01 Oct 2015

IBM

Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Designing an Adaptive Security Architecture for Protection From Advanced Attacks
sponsored by Intel Security
ANALYST REPORT: This white paper teaches you to shift your security mindset from incident response to continuous response. Access now to learn how you can adapt your security system architecture to always on monitoring to better protect your network when perimeter defenses fail.
Posted: 04 May 2016 | Published: 12 Feb 2014

Intel Security

Detecting Malware-Free Intrusions and Advanced Cyber Threats with Anomaly Detection and "Behavioral MD5" of Endpoint Processes
sponsored by Prelert
ANALYST REPORT: This report shows you how machine learning can detect changes in endpoint process behavior to help protect your business. Access now to learn how you can automate the analysis of data by looking for helpful anomalies that indicate malicious activity.
Posted: 25 Apr 2016 | Published: 29 Feb 2016

Prelert

Impostor Email Threats infographic
sponsored by Proofpoint, Inc.
WHITE PAPER: This infographic shows you some stats and facts about imposter emails research conducted on organizations across industries. Access now to learn what to look for in a phishing scheme and how to mitigate the threat.
Posted: 21 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Debunking the Top 5 Security Implementation Myths
sponsored by Kaspersky Lab
WHITE PAPER: This e-book aims to show you that replacing your old cybersecurity can be quick and painless. Access now to learn 5 myths about implementing IT security.
Posted: 04 May 2016 | Published: 01 Dec 2015

Kaspersky Lab

Financial Institutions Data Quality Is Vital For BCBS 239 Compliance
sponsored by Infogix
EBOOK: Discover how your organization can incorporate data quality checks into your risk data aggregation and reporting processes by downloading this e-book now. Learn how you can stay in compliance with BCBS 239 guidelines.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Infogix

FortinetCSO_QP
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement