Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk ManagementReports
 
Getting IT Security Right: Security Lessons Learned
sponsored by Icomm Technologies
VIDEO: This exclusive video looks at why organizations assume that because they haven't had a breach yet they are safe and why that assumption is wrong.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

Icomm Technologies

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Best Practices for Preventing Identity Fraud
sponsored by iovation, Inc.
EGUIDE: This expert e-guide explains how to prevent identity fraud with unique device authentication, as well as several tools used to thwart online fraudsters.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

iovation, Inc.

Financial Services Company Saves $5M Annually with iovation's Fraud Prevention Service
sponsored by iovation, Inc.
CASE STUDY: Discover how a major lending company uses device-based fraud prevention to protect customers and stop sophisticated loan fraud rings.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

iovation, Inc.

NEC Biometrics Solutions: Enhancing the Customer Experience and Securing Endpoints
sponsored by NEC Corporation of America
WEBCAST: This webcast reveals a biometrics solution that will help identify fraud across various industries.
Posted: 02 Oct 2014 | Premiered: Oct 1, 2014

NEC Corporation of America

Leveraging Secure File Sync & Share to Enable Enterprise Productivity
sponsored by Code42
WEBCAST: In this webinar, Alan Pelz-Sharpe, Research Director of Social Business at 451 Research, discusses how organization successfully deploy sync/share solutions and how IT leverages them for increased efficiency.
Posted: 20 Oct 2014 | Premiered: Oct 20, 2014

Code42

How Observe IT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by Observe IT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

Observe IT

IT Compliance FAQ Guide
sponsored by Box
EGUIDE: In this expert e-guide, examine some frequently asked questions with respect to GRC and IT compliance including important frameworks, who is affected and more.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Box

Evaluating Security Monitoring Alternatives
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper makes a case for adding security monitoring to your protection strategy, detailing its value and comparing some services.
Posted: 27 Oct 2014 | Published: 15 Apr 2008

Symantec Corporation

The Total Economic Impact of Verdasys Digital Guardian: Assigning Value to Information Protection
sponsored by Digital Guardian
WHITE PAPER: This resource examines the total economic impact and potential ROI enterprises may receive with Verdasys Digital Guardian.
Posted: 29 Sep 2014 | Published: 31 Oct 2013

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement