Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk Management Reports
 
Prioritizing Security at management and board levels
sponsored by Cisco
WHITE PAPER: This white paper analyzes the IT security capabilities in the UK.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Cisco

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell
EGUIDE: This e-guide discusses ways cybercriminals successfully breach enterprise security and why VDI might be a better approach.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Project Planning for FedRAMP
sponsored by Coalfire
WHITE PAPER: Access this white paper and learn how FedRAMP is intended to improve the security of the cloud implementations that support the operation of the federal government.
Posted: 25 Jan 2016 | Published: 15 Jul 2015

Coalfire

SANS- A Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, you will discover the keys to lowering IR costs and maximizing ROI, View now and learn how to increase your organization's security level by developing an IR process utilizing manual and basic forensics.
Posted: 29 Jan 2016 | Published: 31 Dec 2015

Blue Coat Systems

Virtual Patching in Mixed Environments: How It Works to Protect You
sponsored by TrendMicro
WHITE PAPER: This white paper discusses virtual patching which provides the same functionality as software patches by implementing protective network controls that can shield vulnerable servers from attack.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


Enterprise Scenarios for Database Security Tools and IBM Guardium
sponsored by IBM
EGUIDE: This eGuide discusses some classic use cases and ways organizations often use security add-ons to boost database security.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

IBM

After the Perimeter: How a ‘Segment of One’ Simplifies and Improves Security
sponsored by Cryptzone
WHITE PAPER: This white paper outlines how to improve and simplify network security through a "segment of one" approach. Read on to learn about this new approach to network access, and how it works to see if it's right for your organization.
Posted: 25 Jan 2016 | Published: 25 Jan 2016

Cryptzone

Gartner: Data Loss Prevention Magic Quadrant for Content-Aware Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to see how content-aware DLP solutions incorporate sophisticated detection techniques to help businesses address their more critical data protection requirements.
Posted: 26 Jan 2016 | Published: 12 Dec 2013

Digital Guardian

Advanced Endpoint Protection for Dummies (EBook)
sponsored by Palo Alto Networks
EBOOK: In this eBook, you will read an in-depth examination of today's cyber threat landscape.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

IDC: Securing Data in a Borderless Enterprise
sponsored by Vera
WHITE PAPER: Access this white paper and learn how you can set security and sharing policies for your data wherever it goes, set and change data-access rights in real time, control what people can and can't do with data, and more.
Posted: 25 Jan 2016 | Published: 08 Jul 2015

Vera
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement