IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 378 Matches Previous Page  |  Next Page
Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 01 Jul 2015 | Published: 13 May 2015

Neustar®

Top Things to Know for Windows Server 2003 End-Of-Life
sponsored by Lenovo and Intel
EGUIDE: In this e-guide, learn top tips to help secure the Windows Server 2003 upgrade. In addition, discover why many 2003 users are skipping out on Server 2008, and find out how the cloud plays a role in this transition.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Lenovo and Intel

Managing Multi-Vendor UC Ecosystems
sponsored by IR
WEBCAST: This video introduces IR Prognosis, which identifies issues, reduces MTTR, and manages multi-vendor UC ecosystems, including Microsoft, VMware, Avaya, Cisco, and Alcatel-Lucent. Watch now so you can monitor, measure, and manage the user's complete UC experience and take control of your UC environment.
Posted: 02 Jun 2015 | Premiered: Jun 2, 2015

IR

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

A New Security Strategy: Focusing on Risk
sponsored by Clearswift
WHITE PAPER: This white paper explores how to shift your security strategy from a compliance-based model to a risk-based model to protect strategic assets. Continue reading and discover how to improve your overall security strategy by implementing a security training and awareness program.
Posted: 20 May 2015 | Published: 29 Apr 2015

Clearswift

4 Anti-Malware Platforms Put Through an Anti-Exploit Test
sponsored by Malwarebytes Corporation
VIDEO: In this video, a series of anti-malware platforms are tested with an exploit simulator test to determine which product has the early detection capabilities required for effective security.
Posted: 06 May 2015 | Premiered: 14 Oct 2013


Mitigating Legal and Business Risks of Cyber Breaches
sponsored by UnitedLex
WEBCAST: In this webcast, a panel of experts discusses real case studies illuminating how legal and IT can collaborate to mitigate the business and legal liabilities of a cyber-breach.
Posted: 30 Apr 2015 | Premiered: Apr 1, 2015

UnitedLex

Business Risk: Effective Technology Protecting Your business
sponsored by Hewlett-Packard Limited
WHITE PAPER: Consult the following white paper to learn how to improve your business protection and risk mitigation by applying automation to repetitive tasks. Read on to discover how you can use the approach provided in this paper to reduce downtime cost by 30-60% and reduce lost productivity by 80%.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Hewlett-Packard Limited

Faster Speed-to-Market Through Secure Information Sharing
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how to securely manage file systems and reduce complexity. Read on now to learn how to simplify data sharing with partners without the risk of data loss.
Posted: 28 Apr 2015 | Published: 04 Dec 2013

IntraLinks, Inc

Why Legal and Compliance Staff Need to Tune in to Cyber Risk Management
sponsored by UnitedLex
WHITE PAPER: Access this white paper to learn why a unified or converged approach to threat management is necessary to effectively fight cyber attackers and prevent costly data breaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

UnitedLex

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Limited
RESOURCE: If you want to avoid the costs of cybercrime, you need to know what you're up against. This resource can help.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Hewlett-Packard Limited

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

Governance rules to navigate data mobility and velocity complexities
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Mobile devices have become the Internet's dominant user interface, complicating GRC strategy for many companies. In this classroom, learn governance strategies to remain regulatory compliant as digital assets are increasingly available to users anywhere, at any time.
Posted: 12 Mar 2015 | Premiered: 09 Mar 2015

SearchCompliance.com

Business risks of software vulnerabilities
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Overcoming Stringent Dodd-Frank Act Recordkeeping Requirements
sponsored by Hewlett-Packard Company
CASE STUDY: View now and explore the challenges of staying compliant with stringent Dodd-Frank Act requirements.  Read on to learn how one strategy can help you retain and preserve structured and unstructured data across multiple applications and databases.
Posted: 11 Mar 2015 | Published: 09 Feb 2015

Hewlett-Packard Company

Case Study: Utilizing Predictive Coding to Remain Compliant
sponsored by Hewlett-Packard Company
CASE STUDY: View now to learn how HP mitigated risks and reduced analysis costs in this case study.  Read on to learn how they were able to keep up with information requests and investigations by utilizing predictive coding.
Posted: 11 Mar 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

Case Study: Going Beyond Traditional GRC Utilities and Methods
sponsored by Hewlett-Packard Company
CASE STUDY: View now to learn how one financial services firm met regulatory obligation associated with vast quantities of structured and unstructured data.  Read on to learn how the firm secured, indezed, analyzed, and archived data across all media types.
Posted: 11 Mar 2015 | Published: 05 Feb 2014

Hewlett-Packard Company

Risk, Compliance, and Governance Challenge IT Integration Strategies
sponsored by Axway
RESOURCE: Access this infographic and check out the integration strategies GRC officers have used in the last year and what the impacts have been.
Posted: 11 Mar 2015 | Published: 08 Oct 2014

Axway

3 Step Guide for IT Governance & Compliance
sponsored by Dell Software
WHITE PAPER: This white paper details the three critical steps for maintaining compliance with external regulations and internal security policies. Read on to learn the four key external regulations to consider when preparing an IT compliance audit. Read on to learn more.
Posted: 23 Feb 2015 | Published: 13 Dec 2012

Dell Software

Global Risks Report 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: This important white paper explores a security solution that spans the entire attack continuum.
Posted: 31 Dec 2014 | Published: 18 Nov 2014

Cisco

Key Considerations in Moving to Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Risk Assessment Redo: Trends that make you rethink info governance strategy
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: New data protection vulnerabilities have forced organizations to reexamine risk management strategy. In this classroom, learn how to adapt your risk assessment and information management strategies to face modern threats.
Posted: 08 Dec 2014 | Premiered: 05 Dec 2014

SearchCompliance.com

Cost of a Breach Rising; How to Protect Against It
sponsored by TaaSera
EGUIDE: This expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

TaaSera
1 - 25 of 378 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement