Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk ManagementReports
 
Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Surprising Research on the Evolving State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This resource aims to break the lingering assumption that the cloud is inherently less secure than an enterprise data center environment.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Alert Logic

Ensure Exceptional End-User Experience Without Over-Provisioning IT Infrastructure
sponsored by CA Technologies.
WHITE PAPER: This white paper introduces application performance management (APM) and capacity management tools that can help you maintain top performance of your business-critical applications, while keeping infrastructure costs low.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

CA Technologies.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Examining Cloud Computing Threats and Mitigations
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide details the new threats that come with cloud computing and how you should deal with them.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

CenturyLink Technology Solutions

Five Tips to Improve a Threat and Vulnerability Management Program
sponsored by Alert Logic
EGUIDE: This expert e-guide explains how to improve your enterprise's threat and vulnerability management program in 5 simple steps.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Improve Enterprise APT Detection
sponsored by IBM
EGUIDE: This expert E-Guide explains why enterprises are turning to context-aware security approaches to improve their APT detection capabilities. Follow these tips to tackle advanced persistent threats in your organization.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 08 Jul 2014 | Published: 18 Apr 2014

Sophos, Inc.

I Have to Trust Someone… Don't I?
sponsored by CA Technologies.
WHITE PAPER: This whitepaper outlines the significance of insider threats within every company.
Posted: 25 Jun 2014 | Published: 31 Jul 2013

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement