Business of Information Technology  >   Business Management  >   Risk Management  >  

Occupational Health

RSS Feed    Add to Google    Add to My Yahoo!
Occupational Health Reports
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

5 Ways Virtualization Lowers Costs and Boosts Security for Healthcare
sponsored by Citrix
WHITE PAPER: Mandated IT-enabled technology, such as EHR and medical imaging, directly contributes to better patient care and reduced medical errors – but also poses a challenge for IT. Discover 5 use cases that show how virtualization can make life easier for your IT teams, improve security and result in significant cost savings to your organization.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Citrix

Application Defense In Depth
sponsored by IMMUNIO, Inc.
WHITE PAPER: The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Breach Detection Systems Test Report
sponsored by TrendMicro
WHITE PAPER: This report shows you independent test results of a breach detection system. Uncover the overall test results, a product scorecard, and discover an analysis of its resistance to evasion techniques, detection of SSL encryption, and more.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Leading the Data-Driven Transformation: The CIO & The New Age of Data Quality
sponsored by Trillium Software
WHITE PAPER: Discover the top 6 challenges modern CIOs face, and explore how to leverage data quality to propel CIO success. Learn the best practices for sustainable information management strategies, allowing your CIOs to transform your business models through data-driven digitization.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

Trillium Software

Making the Case for Application Security Testing on Cloud
sponsored by IBM
WEBCAST: It presents to you the pros and cons of application security testing and penetration testing techniques. Discover how you can combat application security threats conveniently and effectively in the cloud.
Posted: 24 Aug 2016 | Premiered: Oct 20, 2015

IBM

Bolster Your Incident Response and Threat Detection Strategy
sponsored by Carbon Black
WHITE PAPER: In these digital times, how can you mitigate modern attacks? Discover how to centralize all endpoint activity into a single console, easily accessible to you at any time. Streamline incident response to quickly mitigate current risks and avoid future ones.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Carbon Black

The Threat Defense Lifecycle — Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement