IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 799 Matches Previous Page  |  Next Page
Defense-In-Depth with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Deployed at strategic points, internal segmentation firewalls (ISFWs) increase threat visibility and enhance breach discovery. Learn how to stop the uncontrollable spread of cyberthreats within your borderless network and prevent any single point from introducing vulnerability.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

Fortinet, Inc.

IT Decision Maker's Cybersecurity Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: This 2016 survey of 1,399 IT decision makers (ITDMs) highlights the shared concerns of new vulnerabilities and security challenges spread across EMEA, APAC and Latin America. Learn how present security infrastructures have struggled to contend with the realities of an increasingly hostile digital world.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

Fortinet, Inc.

Security Analytics Brings Data-Driven Security Into The 21st Century
sponsored by FireMon
RESOURCE: With security analytics, security professionals see opportunities for faster incident response, more efficient staff and better business alignment. Learn how you too can streamline security operations using SIEM systems and enable more efficient, data-centric threat analysis.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

Firewall Clean Up Recommendations
sponsored by FireMon
WHITE PAPER: Discover the benefits of proper firewall policy for your organization. Learn the main causes of firewall policy mistakes, which include excessive access, ineffective change management, lack of aging strategy, etc., and how to clean up your current firewall management processes.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

Ransomware: Mitigating the Threat
sponsored by Zerto
WHITE PAPER: Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling affects don't threaten your business.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

Zerto

Buyers guide to cloud based I&M mgmt
sponsored by IBM
RESOURCE: Learn how to make the most informed decision about on your next enterprise grade IDaaS provider with this buyer's guide.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

IBM

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
WHITE PAPER: Better understand why and how IT strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsize organizations.
Posted: 06 Dec 2016 | Published: 30 Nov 2016

arcserve

Three Golden Rules for Safe and Sound Endpoints
sponsored by IBM
RESOURCE: Discover best practices and new strategies to help mitigate security risk as your enterprise perimeter expands to include new endpoints. Learn a three-part approach to address vulnerabilities, increase control over your environment and ensure compliance with regulatory requirements.
Posted: 05 Dec 2016 | Published: 30 Nov 2016

IBM

Reducing Attack Surface: SANS' Survey on Continuous Monitoring Programs
sponsored by IBM
RESOURCE: Discover how continuous monitoring (CM) is slowly, but surely improving security practices and shifting the focus of today's security teams. Because CM programs do not necessarily call for new resources, learn what you can do right now to improve your existing CM program or establish a new one.
Posted: 05 Dec 2016 | Published: 30 Nov 2016

IBM

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

Southern California Edison Protects Workers and Customers with EHS Management
sponsored by SAP
RESOURCE: Discover how Southern California Edison, the largest subsidiary of Edison International, is using environment, health, and safety (EHS) management tools to streamline management of operational risks and environmental compliance processes. Learn what 4 objectives they were looking to solve with an EHS app and 7 benefits they're receiving.
Posted: 01 Dec 2016 | Published: 31 Dec 2014

SAP

Comparing Data Protection and Information Management Vendors
sponsored by Commvault
WHITE PAPER: Uncover a comparison of two data protection and information management vendors. Learn differences on 5 important factors, such as scalability, innovation, value, and more.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

A Network Security View Of Docker Containers
sponsored by NeuVector
WEBCAST: Many top concerns for containers can be addressed with a better understanding of basic container security and networking. Learn tips for getting visibility into container networking to create a more secure environment overall.
Posted: 30 Nov 2016 | Premiered: Oct 31, 2016

NeuVector

Guide & Checklist to Container Security
sponsored by NeuVector
WHITE PAPER: This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

NeuVector

Threat management: Essential guide
sponsored by ComputerWeekly.com
EGUIDE: Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
Posted: 25 Nov 2016 | Published: 25 Nov 2016

ComputerWeekly.com

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Reduce Open Source Security Risk: Strategies, Tactics and Tools
sponsored by Rogue Wave Software
WHITE PAPER: Discover the tools and services you need to create an open source software (OSS) management strategy for your organization. Implementing an OSS strategy may take time, but when you consider the risks involved with unprotected OSS, it's easy to see the value it brings.
Posted: 22 Nov 2016 | Published: 31 Oct 2016

Rogue Wave Software

Secure Your Connected Medical Devices
sponsored by Zingbox
WHITE PAPER: Unprotected medical devices are the top security vulnerability for the healthcare industry. Access this fact sheet to discover how to protect your medical IT network and ensure operational continuity and reliability of all your connected medical devices.
Posted: 22 Nov 2016 | Published: 31 Oct 2016

Zingbox

Resource Center: Stop Threats and Prevent Data Loss
sponsored by Intel Security
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

Intel Security

State of the Internet Report Q3 2016
sponsored by Akamai
WHITE PAPER: This reports leverages cybersecurity data from around the world to show you how organizations fared against cyberattacks in Q3 2016. You'll learn statistics and see figures illustrating which industries were hit hardest and in what areas. Uncover what you should do in the year ahead to protect your enterprise.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Akamai

State of the Internet Executive Summary
sponsored by Akamai
WHITE PAPER: This report shows you up-to-date statistics on cybersecurity. Better enable your business to make intelligent, strategic decisions based on the information you'll learn.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Akamai

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

From Reactive to Proactive: How to Avoid Alert Fatigue
sponsored by ThreatConnect
WHITE PAPER: Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

ThreatConnect
1 - 25 of 799 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement