Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk Reports
 
Event Processing with TIBCO BusinessEvents
sponsored by TIBCO Software Inc.
WHITE PAPER: Access this white paper to find out how using an event processing application can identify opportunities and threats hidden in your business events.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

TIBCO Software Inc.

Detecting Security Anomalies with Machine Learning Analytics
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

ROI Analysis: How to reduce security risks and labor related costs
sponsored by Alert Logic
WHITE PAPER: This economic impact report analyzes one effective risk management solution to give you an accurate assessment of that product's ROI.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Traps Advanced Endpoint Protection: Technology Overview
sponsored by Palo Alto Networks
WHITE PAPER: This white paper describes a security approach that provides protection before the attacks can penetrate.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

Palo Alto Networks

Stepping up the battle against advanced threats
sponsored by IBM
WHITE PAPER: This white paper examines how and why enterprises have failed to protect themselves against advanced threats and gives suggestions for better security.
Posted: 06 Mar 2015 | Published: 31 Jan 2015

IBM

Case Study: Going Beyond Traditional GRC Utilities and Methods
sponsored by Hewlett-Packard Company
CASE STUDY: View now to learn how one financial services firm met regulatory obligation associated with vast quantities of structured and unstructured data.  Read on to learn how the firm secured, indezed, analyzed, and archived data across all media types.
Posted: 11 Mar 2015 | Published: 05 Feb 2014

Hewlett-Packard Company

Endpoint Security for OS X
sponsored by ESET
WHITE PAPER: This white paper introduces a comprehensive OS X security system that provides you with mixed environment endpoint security.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ESET

Staying Compliant for On-the-Fly Investigations
sponsored by Dell Software
WHITE PAPER: Access this white paper and learn how to make sense of all of your data and remain compliant for on-the-fly investigations.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

Dell Software

Overcoming Stringent Dodd-Frank Act Recordkeeping Requirements
sponsored by Hewlett-Packard Company
CASE STUDY: View now and explore the challenges of staying compliant with stringent Dodd-Frank Act requirements.  Read on to learn how one strategy can help you retain and preserve structured and unstructured data across multiple applications and databases.
Posted: 11 Mar 2015 | Published: 09 Feb 2015

Hewlett-Packard Company

Executive breach response playbook
sponsored by Hewlett-Packard Limited
WHITE PAPER: Download this white paper for a step-by-step guide on how to lead your organization through a crisis with comprehensive planning, sound leadership, and more.
Posted: 25 Mar 2015 | Published: 31 Jan 2015

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement