Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk ManagementReports
 
Crump: Data Protection Challenges in a Mobile World
sponsored by Dell Software
EGUIDE: This expert e-guide takes a look at the various challenges associated with modern mobile technology.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Dell Software

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

LexisNexis + Micron SSDs = Faster, More Reliable Big Data Analytics
sponsored by Micron Technology
WHITE PAPER: This white paper details LexisNexis' soltuion to big data storage performance.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Micron Technology

The Importance of Improving and Adapting Web Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores CSOs' opinions and strategies regarding web security; the challenges that currently stand in the way of web security deployment within many organizations; and the options that businesses have for working through these critical issues.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Defend web properties from modern threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover the challenges of defending modern web properties from modern threats, as well as an application delivery controller (ADC) that works hand in hand with advanced malware protection and high-profile security products.
Posted: 16 Dec 2014 | Published: 31 Dec 2013

Citrix

Attack Intelligence: The Key to Reducing Risk in Healthcare
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper will show how attack intelligence can help you stay in compliance with HIPAA when it comes to risk management.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Secure Business Information in the Cloud with Centralized Management
sponsored by Box
EBOOK: This white paper explores how a new generation of enterprise cloud services can mitigate the security challenges created by decentralized computing.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

How To Achieve Security in a World Where Developers Rule
sponsored by Rackspace
VIDEO: This webcast features Rackspace Cloud Solutions Architect Jaret Chiles, and Senior Product Security Engineer Matt Tesauro, who explain how to secure your applications in the cloud.
Posted: 13 Nov 2014 | Premiered: 09 Jun 2014

Rackspace

Ensuring Progress Toward Risk Management and Continuous Configuration Compliance
sponsored by IBM
WHITE PAPER: This exclusive white paper takes an in-depth look at one endpoint management solution that helped apply, enforce, and manage endpoint security and risk. Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

IBM

CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by CommVault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement