Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk Management Reports
 
Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, security experts discuss exactly what the cloud means for compliance and data protection.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

Five Signs You Have Been – Or Are Being – Hacked
sponsored by EE
WHITE PAPER: This white paper can help you stay alert for advanced threats with five signs that your organization has been hacked
Posted: 12 Aug 2015 | Published: 12 Aug 2015

EE

Maximize ROI by Deploying Strategic Partners in UC&C
sponsored by Polycom, Inc.
WHITE PAPER: In this white paper, you will learn how to minimize deployment risk, while providing IT leaders with a rock-solid deployment with minimal challenges. Learn how to integrate your existing UC infrastructure with potential new voice/video vendors, as well as how to strategize with your partners and leverage your relationship with them.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Polycom, Inc.

Fraud Detection for All of Your Data
sponsored by Splunk
WHITE PAPER: This white paper discusses how you can adopt an anti-fraud strategy that protects all your data, even unstructured data and big data.
Posted: 12 Aug 2015 | Published: 31 Dec 2014

Splunk

Tools, Comparisons, and Scenarios for Threat Intelligence Services
sponsored by Cyveillance, Inc.
EGUIDE: This expert guides separates the benefits of threat intelligence from all the sales talk that usually surrounds the product, discussing exactly what it can do and who really needs it.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Cyveillance, Inc.

Special Report: Compromised Data in the Dark Web
sponsored by SurfWatch Labs
WHITE PAPER: This report reveals the findings of a Dark Web analysis, revealing an alarming amount of compromised data from one company alone.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SurfWatch Labs

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

451 Research Report: How One Security Tool Compares against the Rest
sponsored by Splunk
WHITE PAPER: This white paper analyzes a relatively new player in the security market and discusses its capabilities, strengths and weaknesses.
Posted: 13 Aug 2015 | Published: 31 Jan 2014

Splunk

How to Support IT with an Automated Monitoring Process
sponsored by Splunk
WHITE PAPER: This white paper introduces methodologies for incorporating a highly scalable engine for machine-generated IT data. Read on to learn how to collect, index and harness machine data across physical, virtual and cloud infrastructures.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement