Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Health

RSS Feed    Add to Google    Add to My Yahoo!
Environmental HealthReports
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Get Free GRC Resources and Connect with Peers
sponsored by RSA, The Security Division of EMC
RESOURCE: The RSA Archer GRC Community is an online network of GRC professionals who leverage the content and advice of RSA and its 11,000+ GRC members to help themselves and their organizations excel. Access white papers, blogs, webcasts and more.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

RSA, The Security Division of EMC

Ready, Aim, HP Fortify!
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, discover how the U.S. Army uses a particular software to help prevent attacks to the TAMIS system.
Posted: 10 Sep 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

Towards Active Risk Management with High Performance Data and Grid Management
sponsored by IBM
WEBCAST: In this introductory webcast, gain insights on risk management and the technologies enabling this active, real-time trend.
Posted: 16 Sep 2014 | Premiered: Mar 26, 2014

IBM

Top 7 Steps for Better DoS and DDoS Protection
sponsored by Solutionary
WHITE PAPER: In this essential white paper, discover the top 7 steps to help prevent these cyber-attacks and minimize their impact.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

Solutionary

2014 Security Report: How DDoS Attacks Can Mask More Dangerous Malware Threats
sponsored by Neustar┬«
RESOURCE: In this informative report, discover key findings on the top strategies and techniques for dealing with new DDoS attacks.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Neustar®

ORSA State of Readiness Survey: Addressing the Readiness of US Insurers for the RMOSA
sponsored by IBM
WHITE PAPER: With respect to establishing a risk management framework, insurers have made progress in defining most aspects of their strategies, but there is considerable work remaining with respect to successful implementations. So in short, how do you do it? Check out the following white paper to find out now.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

IBM

e-Guide: Conquering Advanced Persistent Threat Attacks
sponsored by CDW Corporation
EGUIDE: This expert e-Guide clears up common misconceptions about the dangers and characteristics of advanced persistent threats (APTs), and also explains how context-aware security can improve the detection of APTs within enterprises.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

Human Capital Asset Management and Workforce Optimization
sponsored by Genesys
WHITE PAPER: Learn about a business management strategy approach that calls for developing analytical models to define and measure individual capabilities relevant to the organization's desired business outcomes.
Posted: 15 Sep 2014 | Published: 31 Dec 2013

Genesys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement