Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed    Add to Google    Add to My Yahoo!
Loss Management Reports
 
Cybersecurity Perspectives from the Boardroom and C-suite
sponsored by IBM
WHITE PAPER: Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.
Posted: 30 Aug 2016 | Published: 01 Jul 2016

IBM

Five Ways to Protect Your Digital Assets
sponsored by NTT ICT
RESOURCE: Without the right backup and recovery strategies, power surges, theft, hard drive crashes, and corruption of mission-critical data could bring your business to a halt. Access this resource to discover a five-step path to unshakeable business continuity, and explore your backup options.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

NTT ICT

HEB Grocery Store Patches Office 365 Security Flaws
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Frost & Sullivan Best Practices Research: Network Security Forensics
sponsored by RSA
WHITE PAPER: This white paper shows you a comprehensive set of technologies for incident detection and network security forensics that will greatly improve you security posture. Learn how to achieve depth and real-time visibility into the inbound and outbound communications traversing your network.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

RSA

Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

DDoS Attack Stats & Trends
sponsored by Akamai
RESOURCE: This infographic shows you crucial DDoS findings for Q1 of 2016. Learn how drastically DDoS attacks have increased, which industries they've affected the most and what you can do to protect your network.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Akamai

Threat Report: Exploitation & Cyberattacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Your SAP applications are under attack. Access this in-depth threat report to learn about a specific vulnerability being actively exploited, the types of SAP systems affected, and how you can mitigate this vulnerability to minimize business risk.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Communications as a Service: Improving Response Time and Resiliency During Critical Events
sponsored by IBM
DATA SHEET: Safeguard your organization during downtime by leveraging cloud-enabled crisis and incident management. Read on to improve operational processes during unplanned critical events with a service that will boost response effectiveness via real-time situational awareness, demonstrate regulatory compliance, and more.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

IBM

Simplifying Security Engineering With Effective Network Segmentation
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Forrester Consulting conducted a Total Economic Impact (TEI) study and examined the potential return on investment enterprises may realize by deploying Cisco TrustSec. Access this report to explore and evaluate the potential financial impact of Cisco TrustSec on your organization.
Posted: 08 Sep 2016 | Published: 31 Mar 2015

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement