Business of Information Technology  >   Business Management  >   Risk Management  >  

Occupational Health

RSS Feed    Add to Google    Add to My Yahoo!
Occupational Health Reports
 
EH&S Performance Management for Governance, Risk and Compliance
sponsored by ESS
WHITE PAPER: Business complexity, increasing regulations and market security are driving the adoption of a structured approach to governance, risk and compliance. Learn how performance management can help your organization manage and reduce business risk.
Posted: 09 Jul 2007 | Published: 01 Jun 2007

ESS

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

The Most dangerous cyber security threat might be sitting next to you
sponsored by Imperva
WHITE PAPER: This infographic shows you different departments throughout your organization and the high risk actions they perform every day. Whether they be malicious users, compromised users or just careless users, it's possible your own employees are the biggest threat to your data security right now.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

Imperva

Harness Content to Deliver a Superior Customer Experience
sponsored by IBM
MICROSITE: The time it takes to gather scattered content damages customer experience and satisfaction. Enterprise content management (ECM) platforms get the right content to the right people at the right time. Employees will be able to get what they need in order to make the right decisions, work efficiently, and drive results.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

IBM

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat

The Four Steps to Effective Risk and Compliance Management for Financial Services
sponsored by IBM
WHITE PAPER: This white paper illustrates why convergence is key to maximizing governance efforts and provides 4 steps financial services organizations can take to mitigate compliance risks.
Posted: 22 Jul 2016 | Published: 31 May 2011

IBM

Cost of a Data Breach Calculator
sponsored by IBM
RESOURCE: This short survey helps you identify your organization's risk profile, which includes your organization's risk of experiencing a data breach, the average cost per compromised record and the total cost of a data breach to your organization.
Posted: 25 Jul 2016 | Published: 01 Jun 2016

IBM

Incident Response Team: Transform Your IR Team From Reactive to Proactive
sponsored by ThreatConnect
WHITE PAPER: Discover how your IR team can become faster and more effective at protecting your network. Unite your people, processes, and technologies across your organization to eliminating barriers between the systems that used to slow you down.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

Pearl Drums Case Study
sponsored by LogicNow
CASE STUDY: Discover how Pearl Drums U.S. was able to get the antivirus, patch management, automated maintenance and automated monitoring they needed to keep their organization running efficiently. Learn how they gained insight into their network and now proactively protect and secure their IT environment with minimal IT resources.
Posted: 21 Jul 2016 | Published: 01 Jun 2016

LogicNow

Intelligent Endpoint Threat Defense
sponsored by Intel Security
TRANSCRIPT: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Published: 01 Jun 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement