Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Health

RSS Feed    Add to Google    Add to My Yahoo!
Environmental Health Reports
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007


Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

10 Qualities of Effective Next-Generation Endpoint Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This checklist presents the 10 most essential qualities that make endpoint security effective against today's threats.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Bit9 + Carbon Black

Get Your Website in Shape with a Security Health Checkup
sponsored by Symantec Corporation
WHITE PAPER: Access this security report to help you diagnose the health of your web security, and discover best practices to help you determine how to secure your site against attacks most common in 2015.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Symantec Corporation

Compliance 101: Basics for Security Professionals
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this paper for a basic look at the most important compliance considerations all security professionals must be aware of.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Bit9 + Carbon Black

Avoid BYO Policy and Security Pitfalls By Addressing Mobile Threats
sponsored by Citrix
WHITE PAPER: This white paper highlights the legal risks of personally owned technology, and offers policy recommendations and mitigating technology solutions to protect business information. Examine 5 practical case studies to help you recognize and address potential threats from using personal devices at work.
Posted: 28 Oct 2015 | Published: 30 Sep 2014


Case Study: Major Financial Institution Defends against High Volume SQL Injection
sponsored by Akamai
WHITE PAPER: Access this resource to learn how a global financial firm kept valuable data safe from an SQL injection attack.
Posted: 09 Nov 2015 | Published: 09 Nov 2015


State of Security Operations: The 2015 Report on Cyber Defense Maturity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report brings you the latest information on the capabilities of today's security operations centers and how they need to improve.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Hewlett Packard Enterprise

Preparing for the 2015 Holiday Threat Season
sponsored by Bit9 + Carbon Black
WHITE PAPER: Cybercriminals know that IT teams are often distracted during the holiday season, and they're ready to take advantage. Access this resource to learn how to avoid holiday season distractions and keep your business safe.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Bit9 + Carbon Black

3 Ways a N.Y. Hospital Saw Its Workflows Reprogrammed
sponsored by McKesson Corporation
WHITE PAPER: This whitepaper considers how one New York hospital re-evaluated their communication workflows, and shares their improvements. Read on to see how software is reshaping the industry, and how your organization could see similar results.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

McKesson Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement