IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 385 Matches Previous Page  |  Next Page
Cyber Security Roadmap
sponsored by ESET
WHITE PAPER: This white paper presents a clear, easy-to-follow roadmap to creating comprehensive security on a modest budget.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

ESET

Using DLP Tools for Data Leakage Alerting and Preventive Actions
sponsored by Websense
EGUIDE: View this white paper to craft your DLP checklist to get the most out of the tools. Read on to learn how to use DLP for leak prevention.
Posted: 04 Mar 2015 | Published: 07 Jan 2015

Websense

Gartner CIO & IT Executive Summit 2015: Topics, Speakers, and Vendors
sponsored by Gartner
BROCHURE: The Gartner CIO & IT Executive Summit 2015, focusing on Digital Leadership: Evolving the Core and Accelerating Business Value is coming to Munich, Germany on May 20 – 21. Take a look at the following brochure to view the events taking place this year and explore the topics that will be covered.
Posted: 03 Mar 2015 | Published: 03 Mar 2015

Gartner

Mitigating Risk with Security Intelligence and Identity Assurance
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an integrative approach that lets companies quickly identify abnormalities in user behavior, as well as fighting insider threats all while complying with regulations.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

[Security Identity Governance: Reduce Risk and Comply with Regulations
sponsored by IBM
WHITE PAPER: Access this white paper to discover how to effectively manage identities and application access while bringing together business operations and IT. Read on to learn how to bridge the gaps across compliance, and how this can reduce the risk of fraud, human error, and more.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

The Value in Threat Intelligence Information
sponsored by Webroot
EGUIDE: This expert guide describes the pros and cons of threat intelligence and helps you decide if it's right for your company.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Webroot

App Security: Going Beyond Scanning and Remediation
sponsored by Veracode, Inc.
WHITE PAPER: This white paper outlines one cloud-based app security platform that continuously monitors and assesses business-critical applications to find vulnerabilities earlier.
Posted: 24 Feb 2015 | Published: 09 Jul 2014

Veracode, Inc.

3 Step Guide for IT Governance & Compliance
sponsored by Dell Software
WHITE PAPER: This white paper details the three critical steps for maintaining compliance with external regulations and internal security policies. Read on to learn the four key external regulations to consider when preparing an IT compliance audit. Read on to learn more.
Posted: 23 Feb 2015 | Published: 13 Dec 2012

Dell Software

Managing Legal Content in the Cloud
sponsored by Hewlett-Packard Limited
WHITE PAPER: For law firms and corporate legal departments, the dynamics of a cloud delivery approach can be attractive. Learn more about how HP Worksite in the Cloud makes this possible.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

Hewlett-Packard Limited

Intelligent, automated employee communications monitoring
sponsored by Hewlett-Packard Limited
BROCHURE: Learn why some of the world's largest companies rely on HP Supervisor to monitor employees' electronic communications.
Posted: 12 Feb 2015 | Published: 12 Feb 2015

Hewlett-Packard Limited

Does Your Planning & Forecasting Consider Risk? It Should.
sponsored by IBM
WHITE PAPER: Incorporating risk information into the planning process you can reduce risk and include both risk and performance metrics in your measures and incentives.This white paper explains why Risk-Adjusted Planning should be a goal for your organization. Create a culture that embraces risk management as a chance to optimize performance.
Posted: 11 Feb 2015 | Published: 13 May 2011

IBM

Expert assessment: Learn if your file transfer methods are putting you at risk
sponsored by Ipswitch File Transfer
RESOURCE: Take the following file transfer assessment and gain a free, in-depth analysis of you file transfer risks and practices. The custom report will also identify strengths and weaknesses and will provide a useful roadmap of transfer file best practices.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Ipswitch File Transfer

Global Risks Report 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

Allgress Insight Risk Management Suite
sponsored by Allgress
WHITE PAPER: This white paper introduces a risk management suite that enables security professionals to apply business context to security and compliance management. It also empowers business stakeholders to make informed investment decisions that align with top business priorities.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Allgress

Governance, Risk, Compliance as a Service (GRCaaS)
sponsored by Allgress
WHITE PAPER: This white paper examines a cloud-based governance risk and compliance management platform that enables automated compliance reporting, comprehensive risk reporting, improved auditing capabilities and more features that strengthen risk and compliance control.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Allgress

A New Approach to Managing Information & Technology Risk
sponsored by Allgress
WHITE PAPER: This white paper discusses this new approach to governance, risk management and compliance – one that manages IT risk as a key part of overall business operations and promotes stronger collaboration between IT and business-decision makers when it comes to mitigating and controlling these risks.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Allgress

Risk I/O Explainer Video
sponsored by Risk IO
WEBCAST: Download this exclusive video now to learn about a vulnerability management solution that will reveal your system vulnerabilities, identify those most at risk, show you exactly what you need to fix, and much more.
Posted: 26 Jan 2015 | Premiered: Jan 15, 2014

Risk IO

Learn About Each Module of the Allgress Insight Risk Management Suite
sponsored by Allgress
WHITE PAPER: This white paper introduces a risk management suite that enables security professionals to apply business context to security and compliance management. It also empowers business stakeholders to make informed investment decisions that align with top business priorities.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Allgress

The Best Practices for Managing Customer & Cardholder Data to Mitigate Breach Risks
sponsored by Ipswitch File Transfer
WEBCAST: Tune into the following webinar to hear from PCI security and compliance veteran, Matt Getzelman as he reveals his strategies for reducing PCI security and compliance risks, while freeing up IT staff to focus on other critical operational tasks.
Posted: 20 Jan 2015 | Premiered: Jan 20, 2015

Ipswitch File Transfer

Transform Your Risk, Security, and Compliance Results into Business Insight
sponsored by Allgress
WHITE PAPER: This concise white paper introduces an IT GRC suite that enables risk, security, and compliance professionals to efficiently manage their enterprise's risk posture with quick time-to-value.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Allgress

Breach Preparation: Plan for the Inevitability of Compromise
sponsored by Bit9 + Carbon Black
WHITE PAPER: This important white paper provides insight from a data forensics expert, an attorney who works closely with board-of-directors-level management, a crisis communications professional, and an incident responder and technical expert to help you establish an effective incident response plan.
Posted: 12 Jan 2015 | Published: 08 Jan 2014

Bit9 + Carbon Black

Securing the Modern Data Center: Building Proper Security Controls, Policies, and Processes to Address and Mitigate New Risks
sponsored by Cisco
WHITE PAPER: This paper reviews three data center trends and their risks.
Posted: 31 Dec 2014 | Published: 19 Nov 2014

Cisco

3 Essential Aspects of an Integrated Threat Defense Strategy
sponsored by Sourcefire
WHITE PAPER: This exclusive infographic explores the three key aspects of creating an integrated threat defense strategy that gives you the visibility to discover and protect against socially engineered exploits.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Sourcefire

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: This important white paper explores a security solution that spans the entire attack continuum.
Posted: 31 Dec 2014 | Published: 18 Nov 2014

Cisco
1 - 25 of 385 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement