IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 782 Matches Previous Page  |  Next Page
In the Market for a New Key Manager? Then Get in on a Good Thing!
sponsored by Gemalto
WHITE PAPER: This white paper gives you four key reasons why you need to switch to a central key manager. Learn about a full portfolio of flexible encryption options that work on-premises, in traditional data centers and virtualized cloud environments.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gemalto

The Road to SDN is Paved with Visibility and Many Good Intentions
sponsored by Gigamon
WHITE PAPER: Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Application Session Filtering
sponsored by Gigamon
WHITE PAPER: Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.
Posted: 27 May 2016 | Published: 31 Dec 2015

Gigamon

Security Delivery Platform
sponsored by Gigamon
RESOURCE: The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Security for Virtualization Getting the Balance Right
sponsored by Kaspersky Lab
WHITE PAPER: Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.
Posted: 26 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Kaspersky in Action
sponsored by Kaspersky Lab
WHITE PAPER: In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection?
Posted: 26 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

IDC Server Security: Virtualization and Cloud Changes Everything
sponsored by TrendMicro
WHITE PAPER: Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Complete Data Protection (Advanced) - Data Sheet
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Protecting End of Support Systems
sponsored by TrendMicro
WHITE PAPER: You have options available to address and reduce your risk. What you need is comprehensive security controls that can protect older systems like Windows Server 2003 while you plan and execute a transition that makes sense for your business. Review the risks facing your organization and learn how you can smoothly transition into newer software.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Evaluating Hybrid Cloud Security Options to Control Network Security
sponsored by MASERGY
EGUIDE: This e-guide helps you evaluate your hybrid cloud security options to best secure your data as it moves to the cloud. Learn what different organizations are implementing to help their situation, including host-based security tools, encryption and other security services.
Posted: 25 May 2016 | Published: 12 May 2016

MASERGY

Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise
sponsored by Kaspersky Lab
WHITE PAPER: A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

The Threats From Within
sponsored by Kaspersky Lab
WHITE PAPER: With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.
Posted: 25 May 2016 | Published: 25 May 2016

Kaspersky Lab

Virtualization Security: Know Your Options
sponsored by Kaspersky Lab
WHITE PAPER: Discover the top three options for delivering security to your virtual servers. Go in-depth on agent-based security, agentless security and light agent security to see which option fits your unique IT architecture.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.
sponsored by Kaspersky Lab
WHITE PAPER: In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

RANSOMWARE: ALL LOCKED UP AND NO PLACE TO GO
sponsored by Kaspersky Lab
EBOOK: In this e-book, you'll discover how exactly ransomware works, types of ransomware you'll encounter and how to best deal with being held victim by ransomware. Learn hard facts and dispel myths about ransomware vs. businesses.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Future Risks Be Prepared
sponsored by Kaspersky Lab
EBOOK: An increasingly sophisticated threat landscape calls for a multi-layered security approach, in which a combination of integrated technologies provides comprehensive detection and protection against known, unknown and advanced malware and other threats. This report is designed to help you to be better prepared to fight APTs.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Rethinking IT Security
sponsored by Kaspersky Lab
EBOOK: This eBook explores the features that make antivirus a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Management of Native Encryption for Apple FileVault and Microsoft BitLocker
sponsored by Intel Security
WHITE PAPER: With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack. This resource can help ensure you don't end up on the data breach victim's list.
Posted: 25 May 2016 | Published: 01 Apr 2016

Intel Security

Application Session Filtering Cookbook
sponsored by Gigamon
WHITE PAPER: This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.
Posted: 24 May 2016 | Published: 31 Dec 2015

Gigamon

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Gemalto
WHITE PAPER: This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.
Posted: 24 May 2016 | Published: 24 May 2016

Gemalto

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

SANS Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by TrendMicro
WHITE PAPER: Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.
Posted: 24 May 2016 | Published: 01 Feb 2016

TrendMicro
1 - 25 of 782 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement