Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed    Add to Google    Add to My Yahoo!
Industrial Safety Reports
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Addressing the Full Attack Continuum (BDA WP)
sponsored by Cisco Systems, Inc.
WHITE PAPER: It's time for a new threat-centric security model that delivers the visibility and control your organization needs. Discover how to reduce the complexity of threat management while gaining continuous control and advanced threat protection across the entire attack continuum. Act smarter and quicker before, during and after an attack.
Posted: 13 Sep 2016 | Published: 31 Dec 2014

Cisco Systems, Inc.

Guidance on Healthcare Ransomware Attacks
sponsored by OpenDNS
EGUIDE: Learn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated.
Posted: 23 Sep 2016 | Published: 16 Sep 2016

OpenDNS

Frost & Sullivan Best Practices Research: Network Security Forensics
sponsored by RSA
WHITE PAPER: This white paper shows you a comprehensive set of technologies for incident detection and network security forensics that will greatly improve you security posture. Learn how to achieve depth and real-time visibility into the inbound and outbound communications traversing your network.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

RSA

Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

For Better Access Governance, Look Beyond Roles to
sponsored by IBM
WHITE PAPER: Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Threat Report: Exploitation & Cyberattacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Your SAP applications are under attack. Access this in-depth threat report to learn about a specific vulnerability being actively exploited, the types of SAP systems affected, and how you can mitigate this vulnerability to minimize business risk.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

IDC: Rethinking the Network as a Security Sensor and Enforcer
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Given the amount of sensitive data traveling across enterprise networks, cybercriminals will look to use networks to accomplish their goal of data breach. This IDC technology spotlight details how to embed security tools in your network by way of a network security platform.
Posted: 08 Sep 2016 | Published: 30 Oct 2015

Cisco Systems, Inc.

5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks
sponsored by IBM
WHITE PAPER: A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent the 5 most harmful occurrences.
Posted: 25 Aug 2016 | Published: 01 Nov 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement