Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed    Add to Google    Add to My Yahoo!
Loss Management Reports
 
Anti-Exploit Tools: The Next Wave of Enterprise Security
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them.
Posted: 01 May 2015 | Published: 01 May 2015


Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

dapt Your Endpoint Security to Mobility and Advanced Threats
sponsored by AVG Technologies
EGUIDE: Read this expert guide to learn about the different kinds of endpoint security options available, and to begin creating strong, multi-layered defense for all your endpoints.
Posted: 21 May 2015 | Published: 21 May 2015

AVG Technologies

Business Risk: Effective Technology Protecting Your business
sponsored by Hewlett-Packard Limited
WHITE PAPER: Consult the following white paper to learn how to improve your business protection and risk mitigation by applying automation to repetitive tasks. Read on to discover how you can use the approach provided in this paper to reduce downtime cost by 30-60% and reduce lost productivity by 80%.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Hewlett-Packard Limited

The Rise in Cybercrime: A Report on the Current Threat Landscape
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM

Magic Quadrant for Operational Risk Management
sponsored by RSA
EGUIDE: Inside this helpful guide, discover the strengths and cautions of today's top ORM vendors and platforms. Continue reading to learn what to look for in a platform as well as what to avoid when making your selection.
Posted: 13 May 2015 | Published: 15 Dec 2014

RSA

Everything You Need To Know About Private Clouds
sponsored by Accelerite
EBOOK: This ebook highlights 6 major areas you need to focus on to successfully create a private cloud for your company.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Accelerite

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

SCB Builds a Defense Against Malware
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn the story of an architectural firm that dramatically decreased malware attacks while increasing productivity.
Posted: 08 May 2015 | Published: 08 May 2015


An Inside Look at a Security Service Customer Portal
sponsored by IBM
VIDEO: In this video, discover a security service portal that delivers complete visibility of your network, insight into threat analytics, and more.
Posted: 28 May 2015 | Premiered: 12 Apr 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement