Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk Reports
 
What You Need To Know About Cyber Security Development
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide explores the 3 steps for performing a cybersecurity risk assessment and where to target your efforts. Access now to learn how to analyze risk data to build the foundation of your cybersecurity strategy.
Posted: 22 May 2015 | Published: 25 Mar 2015

Hewlett-Packard Company

Managing Enterprise-Wide Model Lifecycle Risk
sponsored by SAS
CASE STUDY: View this white paper to learn how to centralize model risk management and how to achieve a single-pane-of-glass view across the enterprise.
Posted: 24 Apr 2015 | Published: 28 Jan 2015

SAS

Reduce Risk: Cisco Connected Factory Starter Kit
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to discover how this connected factory solution can help you plan, design, build, optimize, and manage your solution.
Posted: 15 May 2015 | Published: 01 Nov 2014

Cisco Systems, Inc.

The Value of Encryption When Deploying Cloud File-Sharing Services
sponsored by Signiant, Inc.
WHITE PAPER: In this expert e-guide, discover tips for efficiently rolling out your cloud file-sharing service and for ensuring that you're using smart encryption practices while doing so.
Posted: 20 May 2015 | Published: 20 May 2015

Signiant, Inc.

Gartner Report: Instituting Layered Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this white paper and included Gartner research to learn the four phases of effective security and how you can build strong protections on each phase.
Posted: 06 May 2015 | Published: 06 May 2015

Hewlett-Packard Company

Why Activity Monitoring Should Supplement Log Management
sponsored by BalaBit
WHITE PAPER: In this white paper, discover how you can fill in your log management gaps by monitoring privileged users.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

BalaBit

Endpoint Security for Today's Cyber Risks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover how you can create layered endpoint security with the combination of anti-malware and anti-exploit software.
Posted: 07 May 2015 | Published: 07 May 2015


How Privileged Activity Monitoring Streamlines Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives suggestions for how you can use privileged activity monitoring to simplify your audit creation , particularly when it comes to ISO compliance.
Posted: 24 Apr 2015 | Published: 24 Feb 2014

BalaBit

Top 10 Reasons to Monitor Privileged Users
sponsored by BalaBit
WHITE PAPER: In this infographic, discover what IT pros really think about privileged activity monitoring, including stats on common security postures, the top ten reasons to adopt privileged identity monitoring, and more.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

BalaBit

Addressing Compliance Issues Around Public Cloud for Content Collaboration with Box for Financial Services
sponsored by Box
WHITE PAPER: This white paper explores how content collaboration with Box for Finanical Services addresses compliance issues. Read now to learn how providing enterprise-class content collaboration capabilities can tackle compliance risk.
Posted: 20 May 2015 | Published: 20 May 2015

Box
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement