Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk Management Reports
 
Manufacturing Company's AWS Success Story
sponsored by TrendMicro
CASE STUDY: If you're migrating to AWS then you need to have comprehensive security in place if you want to protect confidential data. Access this case study that details how one, large manufacturing company was able to secure their move to AWS by implementing a complete server security platform with a wealth of advanced functionality.
Posted: 26 Aug 2016 | Published: 31 Dec 2015

TrendMicro

For better access governance, look beyond roles to entitlements
sponsored by IBM
WHITE PAPER: Learn how to better enforce segregation-of-duties policies to ensure that currently authorized users don't have conflicting entitlements. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don't retain access after they leave the organization.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Web Application Security: Is Your Site Vulnerable to Attackers?
sponsored by Akamai
RESOURCE: This short infographic shows you the importance of intelligent security for your web applications, including the necessity of a web application firewall (WAF). Learn how to seamlessly integrate and manage a cloud-based WAF to keep hackers out of your business.
Posted: 12 Aug 2016 | Published: 01 Jul 2016

Akamai

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

IDaaS: Modernize Your IAM in the Cloud
sponsored by OneLogin
WEBCAST: Through this webina, you'll learn what you can do to make an impact on your business with identity management as a service (IDaaS).
Posted: 25 Aug 2016 | Premiered: Jul 12, 2016

OneLogin

The case for security intelligence services, hosted from the cloud
sponsored by IBM
WHITE PAPER: Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.
Posted: 30 Aug 2016 | Published: 01 Apr 2015

IBM

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper outlines what IT and security professionals learned from 2015's cyber attacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrohpic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Looking for a partner to provide Multi-Factor Authentication?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you what you should expect from your multifactor authentication solution vendor. Discover the solution that integrates with the simplest IT environment to the most complex out there so you don't have to choose between security and convenience.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Gartner 2016 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
ANALYST REPORT: This Gartner Magic Quadrant report shows you how various IAM vendors stack up against each other so you can choose the IGA that's right for your organization.
Posted: 29 Aug 2016 | Published: 29 Feb 2016

IBM

Information Security Consulting Services Report
sponsored by IBM
WHITE PAPER: This Forrester report evaluates 13 most significant information security consulting service providers against a 31 point criteria. It details how well these consultancies fulfill the criteria and where they stand in relation to each other.
Posted: 30 Aug 2016 | Published: 29 Jan 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement