Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed    Add to Google    Add to My Yahoo!
Loss Management Reports
 
How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

GDPR: What it Means to Your Cybersecurity Strategy
sponsored by RSA
WHITE PAPER: More than 90% of Europeans say they want the same data protection rights regardless of where their data is processed, and as a result the EU GDPR came along. This white paper reveals what the GDPR means for your various cybersecurity strategies and how you'll need to adjust your approaches to comply.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

RSA

Case Study: Hyundai Department Store Group
sponsored by Symantec
CASE STUDY: Hyundai Department Store Group faced the challenges of needing to comply with the South Korean Personal Information Protection Act and put customers at ease that their personal information would be protected. In this case study, explore how Hyundai overcame this issue by implementing data loss prevention strategies.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Symantec

DDoS: Strategies for Dealing With a Growing Threat
sponsored by A10 Networks
WHITE PAPER: In 2015, 10% of average DDoS attacks were above 50 Gbps. Today the average size of attacks greater than 50 Gbps quadrupled to 42%. This IDG paper provides research on recent DDoS attacks and compares the data to a similar study conducted a few years ago to discover what measures organizations need to take now to prevent the attacks.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

A10 Networks

Anti-Virus Comparative
sponsored by Symantec
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec

Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow

Find and eliminate security blind spots with always-on vulnerability management
sponsored by Tenable, Inc.
WHITE PAPER: Explore this Frost & Sullivan white paper to learn more about vulnerability management: implementation, endpoints, user behavior, and more. Inside, also discover why one vulnerability management vendor received Frost & Sullivan's 2017 Visionary Innovation Leadership Award.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Tenable, Inc.

10 Traits Of Successful DLP Programs
sponsored by InteliSecure
WHITE PAPER: According to Gartner, by 2018, 90% of organizations will implement at least one form of integrated DLP. This white paper reveals 10 traits of successful DLP programs to increase the effectiveness of your program.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

InteliSecure

Enhance Your Security & Compliance for Amazon Web Services
sponsored by CloudPassage
WHITE PAPER: As enterprises move applications from traditional data centers to a public or hybrid cloud environment, the security model needs to change. This white paper explores how you can boost your AWS security to keep up with this change.
Posted: 10 Oct 2017 | Published: 31 Dec 2016

CloudPassage

Get Ahead of GDPR Demands
sponsored by IBM
WHITE PAPER: The GDPR financial penalties for non-compliance are daunting; learn how to gain GDPR compliance by keeping your company's data secure. This article provides insight into preparing for the GDPR by accelerating compliance readiness and managing data breaches.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement