Business of Information Technology  >   Business Management  >  

Enterprise Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Risk Management Reports
 
A Powerful Platform for Cloud Security Analytics
sponsored by Exabeam
WHITE PAPER: Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Gemalto SafeNet Keysecure for MongoDB Encryption Key Management for MongoDB Native Encryption
sponsored by Gemalto
WHITE PAPER: Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

RANSOMWARE: ALL LOCKED UP AND NO PLACE TO GO
sponsored by Kaspersky Lab
EBOOK: In this e-book, you'll discover how exactly ransomware works, types of ransomware you'll encounter and how to best deal with being held victim by ransomware. Learn hard facts and dispel myths about ransomware vs. businesses.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Practical Guide to IT Security Breach Prevention Part I
sponsored by Kaspersky Lab
WHITE PAPER: For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.
Posted: 12 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

The State of Mobile Application Insecurity - Ponemon Institute Research Report
sponsored by IBM MaaS360
RESOURCE: This Ponemon Institute study, which encapsulates 640 individuals involved in the application development and security process, will help you understand how organizations are reducing the risk of unsecured mobile apps used in their business practices.
Posted: 18 May 2016 | Published: 28 Feb 2015

IBM MaaS360

Gartner Magic Quadrant for Endpoint Protection Platforms
sponsored by Intel Security
ANALYST REPORT: This Magic Quadrant report direct from Gartner investigates the quality of endpoint protection platforms, capabilities, the depth of features and the ease of control from current endpoint vendors to help you decide the proper endpoint security platform for your organization (and your budget).
Posted: 12 May 2016 | Published: 01 Feb 2016

Intel Security

Keep Your Data Safe for Office 365
sponsored by Intel Security
RESOURCE: Built in DLP capabilities aren't robust enough to stop advanced persistent threats. Access now to learn how you can enhance your cloud data protection and gain expansive, yet flexible policies that will help address threats to your data and risky employee behavior.
Posted: 13 May 2016 | Published: 01 Apr 2016

Intel Security

Staying out of the next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.
Posted: 12 May 2016 | Premiered: 28 Apr 2016

Intel Security

The Threats From Within
sponsored by Kaspersky Lab
WHITE PAPER: With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.
Posted: 25 May 2016 | Published: 25 May 2016

Kaspersky Lab

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement