IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 858 Matches Previous Page  |  Next Page
Hackers Aren't As Picky As You Think
sponsored by Verizon
VIDEO: Discover the first truth of network security: That malicious actors are mostly out for low hanging fruit. With the resources found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.
Posted: 24 Jun 2016 | Premiered: 28 Apr 2016

Verizon

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WHITE PAPER: Making sure you can provide secure I.T. oversight is the first step in considering a file sync and share solution for your organization. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for next-generation workspaces.
Posted: 24 Jun 2016 | Published: 01 May 2016

Citrix

Rethinking the cyber security disconnect
sponsored by VMware
WHITE PAPER: Discover five ways you can improve your security posture today and instruct employees on more secure data handling. Learn why it's important for business leaders to understand cyber security as a top priority and ultimately save money in mitigating threats rather than reacting to them.
Posted: 24 Jun 2016 | Published: 01 May 2016

VMware

Top 10 Reasons to choose EMC Data Protection Solutions
sponsored by Richardson Eyres
WHITE PAPER: Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.
Posted: 23 Jun 2016 | Published: 01 May 2016

Richardson Eyres

The Axway MFT Solution Transcript
sponsored by Axway
WHITE PAPER: It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.
Posted: 23 Jun 2016 | Published: 01 May 2016

Axway

Axway Use Cases- Transcript
sponsored by Axway
WHITE PAPER: Learn how a globally recognized watch manufacturer is maintaining its brand equity and commerce with global partners. See how they optimized the transfer, communication and security of information from HQ to their partners.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

MFT as a Shared Service- Transcript
sponsored by Axway
TRANSCRIPT: Learn how to meet this bandwidth demand head-on. See how managed file transfer as a service can actually help industries in trying to navigate this explosion of data in the digital space more clearly and securely.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

Unlocking the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT: Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Palo Alto Networks

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

IBM Security Trusteer Pinpoint Detect Solution Brief
sponsored by IBM
WHITE PAPER: You need a fundamentally different approach to detecting fraud that will also decrease false positives. Discover how to build fraud detection based on visibility, global threat intelligence and agility. Simplify your approach and accurately identify fraud throughout the entire fraud lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

Analyze This
sponsored by SAS
WHITE PAPER: See how other organizations define security analytics and why you should consider its implementation to better optimize your organization. Learn how you can assess security performance to make better spending and policy decisions.
Posted: 21 Jun 2016 | Published: 01 May 2016

SAS

IBM Security Trusteer Fraud Protection Suite solution brief
sponsored by IBM
WHITE PAPER: Discover more accurate fraud detection and gain greater visibility and adaptability across the fraud management lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

Mobile Data Security Threats: Hype vs. Reality
sponsored by Lookout
EGUIDE: As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
Posted: 20 Jun 2016 | Published: 14 Jun 2016

Lookout

A Comprehensive, Innovative Approach to Mobile Security
sponsored by Unisys
WHITE PAPER: Because of new mobile threat vectors, security at the device-level is no longer enough. Discover how to strengthen your mobile endpoints from the inside-out with software-defined security, securing mobile data along the entire path to the destination server.
Posted: 20 Jun 2016 | Published: 30 Sep 2015

Unisys

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: A comprehensive managed file transfer solution provides off-the-shelf integration with common security products and end-to-end visibility into and monitoring of file transfers. It will help you ensure the rapid onboarding of new customers and partners, as well as governing interactions with trading partners.
Posted: 20 Jun 2016 | Published: 01 May 2016

Axway

Success Story Video: State of California
sponsored by Axway
VIDEO: They were able to build their website quickly using a managed file transfer (MFT) system. Learn how they now centrally manage and monitor secure file transfers across all their sites and applications for all their agencies.
Posted: 17 Jun 2016 | Premiered: 01 May 2016

Axway

Addressing the Problem of Business Email Compromise
sponsored by Cloudmark
WEBCAST: Using recent examples, Cloudmark's VP of Product Management, Kevin San Diego and Gartner Research Director Perry Carpenter will tell you how to prevent future spear phishing attacks and what capabilities a spear phishing solution needs to include in order to be effective.
Posted: 17 Jun 2016 | Premiered: May 1, 2016

Cloudmark

Is your business risking a USD 100 million loss?
sponsored by IBM
WHITE PAPER: Learn how to safely replicate and archive data to enable your end users while discouraging data loss. Implement technologies that give you greater visibility into your data so nobody in your organization makes the next $100 million mistake.
Posted: 17 Jun 2016 | Published: 01 May 2016

IBM

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Stop Ransomware with Carbon Black
sponsored by Carbon Black
WHITE PAPER: Re-imaging security methods will never be the right solution to this problem. Learn about the tools imperative in preventing, detecting and remidiating randsomeware threats to your endpoints. Get greater visibility through continuous monitoring throughout your whole network.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Uniting the Security Community and Shifting the Economic Balance of Cyber Defense
sponsored by Carbon Black
WHITE PAPER: The security industry cannot continue to perpetuate the idea that technology alone will solve our security problems. Learn how to share attack details with colleagues outside of your own organization to benefit the entire cybersecurity community.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Mobile Application Security Report 2016
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover just how much of your data is being collected and to what extent applications can access your data. Learn precautionary steps you can take to make sure applications aren't grabbing data you don't want them to and make responsible choices when downloading apps.
Posted: 16 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

The Breach Detection Gap and Strategies to Close It
sponsored by Infocyte
WHITE PAPER: What's needed is a layered approach to breach discovery that includes looking for threats which have slipped past the perimeter. Discover how to catch what prevention technologies miss. Reduce the breach detection gap and learn now to mitigate the possible damage caused by prolonged unauthorized access.
Posted: 15 Jun 2016 | Published: 01 May 2016

Infocyte

Clustering for Axway SecureTransport
sponsored by Axway
WHITE PAPER: Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Leverage leading technologies to improve performance, management, scalability, and resiliency, so your MFT infrastructure is always available to support the way you, your customers, and your partners do business.
Posted: 15 Jun 2016 | Published: 31 Dec 2012

Axway

Employing Cyber Threat Intelligence
sponsored by Anomali
WHITE PAPER: Cyber threat intelligence is fast becoming a cornerstone in enterprise security but are you using your various intelligence feeds most effectively? Learn how organizations large and small are increasingly adding threat intelligence to their security posture and see what type of attacks you can mitigate using threat intelligence.
Posted: 15 Jun 2016 | Published: 01 Feb 2016

Anomali
1 - 25 of 858 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement