Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed    Add to Google    Add to My Yahoo!
Industrial Safety Reports
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

How Multi-Vendor DNS Can Protect Your Internet Presence
sponsored by Dyn
WEBCAST: In 2016, the DDoS attack on Dyn shined a light on the inherent vulnerabilities within the internet that were never in the forefront for many IT teams, until now. Access this webinar to learn from Dyn's vulnerabilities and the value of a secondary, multi-vendor DNS strategy for resilience within your infrastructure.
Posted: 07 Dec 2016 | Premiered: Oct 26, 2016

Dyn

Leverage On-Demand Testing with Vulnerability Analytics
sponsored by IBM
WHITE PAPER: Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

IBM

Lowering Business Risk with Data
sponsored by Cloudera
WHITE PAPER: Companies must stay one step ahead of looming risks. Learn how you can reduce your overall risk exposure by more effectively leveraging your data.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

Cloudera

Secure and Accelerate User Access to Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by Fortinet, Inc.
EGUIDE: What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.
Posted: 14 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement