Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed    Add to Google    Add to My Yahoo!
Loss Management Reports
 
Managing Multi-Vendor UC Ecosystems
sponsored by IR
WEBCAST: This video introduces IR Prognosis, which identifies issues, reduces MTTR, and manages multi-vendor UC ecosystems, including Microsoft, VMware, Avaya, Cisco, and Alcatel-Lucent. Watch now so you can monitor, measure, and manage the user's complete UC experience and take control of your UC environment.
Posted: 02 Jun 2015 | Premiered: Jun 2, 2015

IR

Mitigating Data Sharing Risks and Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative approach to reducing data sharing risks between internal teams and outside parties. View now to learn how to safeguard data and files and minimize leaks.
Posted: 14 May 2015 | Published: 25 Mar 2015

IntraLinks, Inc

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

HP employs Microsoft Windows Server 2003 Migration Program
sponsored by HP
WHITE PAPER: This white paper explains how to employ a Microsoft Windows Server 2003 migration program. Read now to migrate to Windows Server 2012 R2 while making business improvements.
Posted: 16 Jun 2015 | Published: 31 May 2015

HP

Powerful Anti-Malware for Your Mobile Device
sponsored by Malwarebytes Corporation
WHITE PAPER: Those who haven't yet secured their mobile devices are courting serious risk. In this white paper, discover what mobile anti-malware can do to bolster your mobile security.
Posted: 07 May 2015 | Published: 07 May 2015


Information Visibility: Reducing Business Risk
sponsored by Clearswift
WHITE PAPER: This paper introduces the concepts and ideas behind an information governance platform by providing details of some of its key features, such as Adaptive Redaction and information discovery and tracking through the Information Governance Server.
Posted: 26 May 2015 | Published: 01 Apr 2015

Clearswift

A strong information security program is a competitive gain, not just a cost
sponsored by Hewlett-Packard Company
EGUIDE: This e-guide discusses why good cybersecurity can win you more customers and gives you tips for getting the most return on your security investments.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Hewlett-Packard Company

CSI Techniques for IT Security
sponsored by Absolute Software
WEBCAST: This webinar illustrates the importance of staying ahead of the curve. Join Lance Mueller, Magnet Forensics' own Director of Forensics, to learn why you should proactively monitor for early signs of an IT security incident.
Posted: 07 May 2015 | Premiered: Jan 3, 2014

Absolute Software

Information governance in a big data world
sponsored by IBM
WHITE PAPER: In this white paper you can discover the key to creating a holistic governance framework in a big data world. Access now to learn tips and strategies for creating the most effective data governance strategy for your organization.
Posted: 06 Jul 2015 | Published: 30 Sep 2014

IBM

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement