Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk Reports
 
Impact Assessment of a Gigamon Partnership
sponsored by Gigamon
WHITE PAPER: This Forrester Report examines the ROI enterprises may realize from deploying Gigamon for network security needs. It provides readers with clear cut choices to evaluate the possible financial impact of Gigamon on their organization.
Posted: 07 Jun 2016 | Published: 01 May 2016

Gigamon

Axway Use Cases- Transcript
sponsored by Axway
WHITE PAPER: Learn how a globally recognized watch manufacturer is maintaining its brand equity and commerce with global partners. See how they optimized the transfer, communication and security of information from HQ to their partners.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Published: 01 May 2016

Intel Security

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning on today's bot battlefield takes time, expertise, and a dedicated team. Get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Internet of Things: Enterprise Risks, Platform Options to Consider
sponsored by Xively by LogMeIn
EGUIDE: The Internet of Things (IoT) increases the number of security risks businesses face, becoming a backdoor for attackers into the enterprise. Discover 7 key security risks associated with IoT and how to manage them. Plus learn how robust cloud platforms will allow IoT to reach its potential.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Xively by LogMeIn

Top 10 Reasons to choose EMC Data Protection Solutions
sponsored by Richardson Eyres
WHITE PAPER: Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.
Posted: 23 Jun 2016 | Published: 01 May 2016

Richardson Eyres

Unlocking the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT: Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Palo Alto Networks

Few Fully Prepared for Software Security Risks
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper shows you results from a recent security survey and the value of testing your security measure regularly.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

7 Key Factors of a Highly Effective Application Protection Solution
sponsored by Arxan
WHITE PAPER: An effective application protection solution is paramount to safeguard the integrity and confidentiality of an application. This whitepaper discusses the key factors that enable an effective application protection solution.
Posted: 30 Jun 2016 | Published: 01 May 2016

Arxan

How business innovations meet the business of hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Hackers are sophisticated but what does that mean for your business? Explore the business of hacking. Discover the different ways cybercriminals make money, their motivations and different hacking organizations.
Posted: 14 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement