Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk Reports
 
Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Protect Your Computer Screen With OptioLabs' OptioAware
sponsored by OptioLabs
VIDEO: In this video, you will learn about organizational software to control proprietary and regulated information displayed on Windows desktops, laptops and tablets. Access now to learn how you can actively prevent visual eavesdropping by blurring your display when authorized users aren't paying attention to it.
Posted: 30 Mar 2016 | Premiered: 15 Dec 2015

OptioLabs

Tracking the Most Significant Cyber Threat
sponsored by OpenDNS
WEBCAST: This webcast shows you steps you can take to better protect your organization and reduce the risk of ransomware infections.
Posted: 18 Apr 2016 | Premiered: Mar 30, 2016

OpenDNS

Commvault Secure File Sharing
sponsored by Commvault
WHITE PAPER: This white paper shows you a file sharing solution that improves user productivity by keeping files synchronized and accessible across devices. Access now to regain control of data to reduce risk or regulatory, governance and security issues.
Posted: 21 Apr 2016 | Published: 01 Mar 2016

Commvault

The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

CIS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Posted: 04 Apr 2016 | Published: 23 Mar 2016

AlienVault

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM
WHITE PAPER: This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.
Posted: 22 Apr 2016 | Published: 01 Mar 2016

IBM

2016 Security Predictions
sponsored by TrendMicro
ANALYST BRIEF: This article shows you growing trends over the past year plus gives you predictions about cybercrime moving forward. Learn what organizations across industries are doing to curb their risks for attacks and what you can do to prepare yourself for the future of cybercrime.
Posted: 19 Apr 2016 | Published: 15 Oct 2015

TrendMicro

Cybersecurity and Data Theft Prevention
sponsored by Forcepoint
WHITE PAPER: This white paper provides a non-technical overview on cybersecurity and provides topics that every CEO should consider. Learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement