Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Health

RSS Feed    Add to Google    Add to My Yahoo!
Environmental HealthReports
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Leveraging Secure File Sync & Share to Enable Enterprise Productivity
sponsored by Code42
WEBCAST: In this webinar, Alan Pelz-Sharpe, Research Director of Social Business at 451 Research, discusses how organization successfully deploy sync/share solutions and how IT leverages them for increased efficiency.
Posted: 20 Oct 2014 | Premiered: Oct 20, 2014

Code42

What You Need for an Effective HIPAA Security Risk Assessment
sponsored by CDW Corporation
RESOURCE: An in-depth look inside the 4 key components of a top-notch security risk assessment.
Posted: 03 Oct 2014 | Published: 14 Aug 2014

CDW Corporation

Managed Security Services: When It's Time to Stop Going "It" Alone
sponsored by NEC Corporation of America
WHITE PAPER: Even if an organization is capable of the traditional, DIY integration of on-promise security solutions using in-house resources, is it truly any better than leveraging the expertise, scale and scope of a third-party service provider?
Posted: 15 Oct 2014 | Published: 15 Oct 2014

NEC Corporation of America

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will teach you how to protect yourself from damaging attacks and effectively respond to them and unveils the protection and defense life cycle.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation

Cloud enabling the banking industry
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report explores how the banking industry architecture network (Bian) service landscape may be used to define a comprehensive commercial blueprint that could be used to cloud-enable the banking industry.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

CW Europe – October 2014 Edition
sponsored by ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement