Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed    Add to Google    Add to My Yahoo!
Industrial Safety Reports
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Understanding today’s information security threats
sponsored by Dell SecureWorks
PODCAST: This podcast can help you gain the understanding you need to secure your organization by describing what threats your business faces and how you can combat them.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

Dell SecureWorks

Endpoint Security: The Identity and Access Imperatives
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of integrating IAM with your endpoint security measures.
Posted: 17 Jul 2015 | Published: 30 Nov 2014

Symantec Corporation

Minimize Risk by Avoiding Shadow IT
sponsored by Cloud Sherpas
WHITE PAPER: Read this white paper to find out the primary risks of Shadow IT, along with how to avoid it and minimize risks.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

Cloud Sherpas

2015 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper provides the full details on the 2015 global data breach study, and shows you how to adequately protect your data. Read on to learn more about why the costs of data breaches have increased, and how you can respond immediately in the event of a breach.
Posted: 10 Jul 2015 | Published: 31 May 2015

IBM

Securing Information in the New Digital Economy
sponsored by Oracle Corporation
WHITE PAPER: This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Oracle Corporation

Modernize Your Backups for Modern Data Volumes
sponsored by IBM
VIDEO: This brief video discusses how an effective storage management platform can not only simplify your storage, but enhance data backup and protection as well.
Posted: 13 Jul 2015 | Premiered: 13 Jul 2015

IBM

How to Secure Your App-Driven Business
sponsored by IBM
WHITE PAPER: This white paper outlines key security dangers of mobile apps and how to eliminate them. Read on to learn how to build an effective app security strategy that is sustainable and scalable, and how to protect apps at every stage of development.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

Countdown to Compromise: The Timeline of a Spear-Phishing Attack
sponsored by Mimecast
WHITE PAPER: This white paper uses a typical spear-phishing scenario to demonstrate the dangers spear-phishing poses.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Mimecast
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement