Business of Information Technology  >   Business Management  >  

IT Risk Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Risk Management Reports
 
The Fight Against Ransomware
sponsored by Sophos
WEBCAST: Endpoint security has reached a tipping point. Ransomware is expected to generate $1B+ in profit this year. Gain insight into a ransomware strategy and how endpoint security has changed overtime by watching this webcast.
Posted: 03 Oct 2017 | Premiered: Oct 3, 2017

Sophos

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

5 Steps to Building a Successful Vulnerability Management Program
sponsored by Tenable, Inc.
WHITE PAPER: Vulnerability management is something that will never end and will need to be improved and worked on periodically to ensure the security of your enterprise.Explore this white paper to learn more about successful vulnerability management programs to protect your enterprise.
Posted: 30 Oct 2017 | Published: 27 Apr 2017

Tenable, Inc.

13 Essential Steps to Meeting the Security Challenges
sponsored by Tenable, Inc.
WHITE PAPER: While multinational companies can likely meet some of the GDPR requirements right now, most will find that they have a lot of work to do in order to meet full compliance. Key into this white paper to gain a deeper understanding of GDPR and why the regulation is important to IT professionals.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Tenable, Inc.

10 Traits Of Successful DLP Programs
sponsored by InteliSecure
WHITE PAPER: According to Gartner, by 2018, 90% of organizations will implement at least one form of integrated DLP. This white paper reveals 10 traits of successful DLP programs to increase the effectiveness of your program.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

Anti-Virus Comparative
sponsored by Symantec
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

7 Features You'll Find in the Most Advanced DLP Systems
sponsored by Symantec
WHITE PAPER: Cloud services and mobile devices have made the challenges of safeguarding company data even more severe. Explore this white paper to find 7 key features to look for when evaluating a DLP system for your company.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Symantec

Risk Management Pool Achieves Flexible Storage Capabilities
sponsored by Hewlett Packard Enterprise
CASE STUDY: The Special District Risk Management Authority needed a way to improve storage capacity, as well as data-retention and disaster recovery capabilities. Access this case study to learn how they deployed hyperconverged infrastructure throughout their data centers to meet these challenges and then some.
Posted: 13 Nov 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement