Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk Management Reports
 
Case Study: Going Beyond Traditional GRC Utilities and Methods
sponsored by Hewlett-Packard Company
CASE STUDY: View now to learn how one financial services firm met regulatory obligation associated with vast quantities of structured and unstructured data.  Read on to learn how the firm secured, indezed, analyzed, and archived data across all media types.
Posted: 11 Mar 2015 | Published: 05 Feb 2014

Hewlett-Packard Company

Why Role Management has the Spotlight
sponsored by SailPoint Technologies
WHITE PAPER: Uncover how role management can help your organization manage information security and corporate risk in three key areas. Access now to learn more.
Posted: 24 Mar 2015 | Published: 04 Dec 2013

SailPoint Technologies

Safeguard Enterprise Compliance and Remain Vigilant Against threats.
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges organizations face due to changing risk and compliance requirements.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

IBM

Survey Reveals the Danger of DNS Attacks
sponsored by Efficientip
WHITE PAPER: This survey on DNS attacks reveals how powerful DNS attacks are and what securities are most effective against them.
Posted: 05 Mar 2015 | Published: 30 Jun 2014

Efficientip

2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This 2015 cyber risk report provides a broad view of the 2014 threat landscape and gives you the information you need to protect your business.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Hewlett-Packard Company

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

5 Reasons Why Your DNS Protection Isn't Doing Enough
sponsored by Efficientip
WHITE PAPER: This white paper lists 5 ways that traditional security solutions fail against DNS attacks.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Efficientip

Security Lessons Learned from 2014
sponsored by ESET
WEBCAST: This webcast discusses some of the most prevalent threats of 2014 and the lessons learned from them.
Posted: 12 Mar 2015 | Premiered: Dec 31, 2014

ESET

Detecting Security Anomalies with Machine Learning Analytics
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Absence Management - A Guide to Developing a Strategy to Minimise Cost and Risk
sponsored by Workforce Software
WHITE PAPER: Access this white paper to find out why absence management is so important to minimizing cost and risk.
Posted: 20 Mar 2015 | Published: 31 Jan 2015

Workforce Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement