Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk Management Reports
 
Hidden Email Malware Revealed
sponsored by Check Point Software Technologies Ltd.
WEBCAST: In this brief webcast, learn about one cloud-based anti-malware platform that can stop cyberattacks at the gateway before they make it onto your network. View now to learn if this platform can help bolster your defenses.
Posted: 03 Mar 2015 | Premiered: Oct 31, 2013

Check Point Software Technologies Ltd.

How to Protect Intellectual Property Against Data Breaches
sponsored by Websense
EGUIDE: The stakes and costs are high for any breached organization; the key now is to plan.  View this expert e-guide to learn the steps to protecting IP.
Posted: 03 Mar 2015 | Published: 04 Feb 2015

Websense

How to Speed Up Detection of Advanced Attacks
sponsored by Threat Track Security
WEBCAST: This webcast provides guidelines for catching and stopping threats before they have time to do damage.
Posted: 16 Feb 2015 | Premiered: Dec 3, 2014

Threat Track Security

Discover the Capabilities of a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Survey Results: How Are Security Analytics Used?
sponsored by AlienVault
WHITE PAPER: This survey explores issues of security analytics and intelligence, revealing how IT security teams use those tools to detect cyber-attacks.
Posted: 23 Feb 2015 | Published: 31 Dec 2014

AlienVault

New Threats to Healthcare and How to Stop them
sponsored by NaviSite
WEBCAST: This webcast provides you with a detailed analysis of healthcare's security threats and suggestions for combatting them.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

NaviSite

Realize the Serious Economic Impact of Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: View this informative report to learn how detrimental APTs can be for your organization, particularly pertaining to your finances.
Posted: 03 Mar 2015 | Published: 01 May 2014

IBM

The Cyber Security Defensive Strategy Playbook
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Access this cyberthreat report that sheds light on the evolving nature of threats, the actors behind them, and the successful techniques they are utilizing. Read on now to get helpful tips on how to craft your defensive strategy.
Posted: 19 Feb 2015 | Published: 04 Dec 2014

ForeScout Technologies, Inc.

Win the War on Cybercrime with Four Key Elements
sponsored by IBM
WHITE PAPER: The following white paper helps you stay ahead of cybercriminals by outlining the four key elements of fraud prevention.
Posted: 24 Feb 2015 | Published: 31 Dec 2013

IBM

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement