IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 794 Matches Previous Page  |  Next Page
Deep Security Protection from Ransomware
sponsored by TrendMicro
WHITE PAPER: This white paper teaches you how to protect your servers from ransomware attacks through anti-malware, intrusion prevention, integrity monitoring and web reputation.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Breach Detection Systems Test Report
sponsored by TrendMicro
WHITE PAPER: This report shows you the test results of Trend Micro Deep Discovery Inspector Model 4000 v3.8SP2 and shows you important points to consider for every product review.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

TrendMicro

SIEM’s Total Cost of Ownership – Key Considerations
sponsored by LogRhythm, Inc.
WHITE PAPER: Through this short white paper, you'll understand how to take a holistic view on SIEM platform capabilities and discover the impact SIEM can have on your security people and processes. Learn what factors to consider when assessing SIEM business practicality and total cost of ownership.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Blueprint for CIS Control Application: Securing the SAP Landscape
sponsored by Onapsis
WHITE PAPER: Your organization should be thinking about how best to protect SAP systems. This paper teaches you how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.
Posted: 24 Aug 2016 | Published: 01 Jun 2016

Onapsis

Looking for a partner to provide Multi-Factor Authentication?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you what you should expect from your multifactor authentication solution vendor. Discover the solution that integrates with the simplest IT environment to the most complex out there so you don't have to choose between security and convenience.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report
sponsored by IBM
WHITE PAPER: The Endpoint Security Maturity Model provides helpful guidance for developing a long-term strategy for endpoint management. Read some of the results from the SANS 2016 Endpoint Security Survey to learn how organizations are dealing with the changing endpoint landscape and where they fall short.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

How to Avoid the Illusion of Your Corporate Network
sponsored by Above Security
WEBCAST: This webinar helps you understand what your business and security intersection looks like and how your risk management abilities could improve moving forward. Learn the inextricable link between business and security and how to best integrate cyber security with business practices.
Posted: 22 Aug 2016 | Premiered: Jul 1, 2016

Above Security

Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and other breaches
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive.
Posted: 19 Aug 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

IDC Report: Modern Defense Against Sophisticated Attacks Requires Comprehensive Endpoint Protection
sponsored by RSA
WHITE PAPER: Discover how to bolster your existing security infrastructure with tools designed to detect advanced threats from each of the 3 STAP subcategories: endpoint, boundary, and internal network analysis. Learn how to combine capabilities designed to analyze suspicious files with behavioral analysis to identify suspicious file activity early.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

RSA

Cybersecurity Poverty Index
sponsored by RSA Softcat
WHITE PAPER: Uncover the findings of The Cybersecurity Poverty Index, completed by 878 respondents across 81 countries. It provides a measure of the risk management and information security capabilities of the global population.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Advanced Persistent Threats and the Case for a Security Intelligence and Response Program
sponsored by Above Security
WHITE PAPER: Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

An Enterprise Security Program and Architecture to Support Business Drivers
sponsored by Above Security
WHITE PAPER: This white paper presents the case for leveraging enterprise security architectures to meet an organization's need for information assurance. It'll help you understand information assurance and show you how to align security initiatives with business goals to deliver an effective security program.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

Ransomware
sponsored by OpenDNS
PODCAST: This podcast looks at ransomware and how the cybercrime business operates.
Posted: 17 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

Ashley Madison
sponsored by OpenDNS
PODCAST: In this episode of Root Access, you'll take a look at the Ashley Madison breach, one of the most unique and impactful breaches in history, and how it affected everyone on a personal level, plus the security details of how it occurred.
Posted: 17 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

Application Defense In Depth
sponsored by IMMUNIO, Inc.
WHITE PAPER: The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

SC Mag Reviews a SIEM Platform
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: Learn how you can upgrade to next-generation SIEM with artificial intelligence, sophisticated pattern recognition and behavioral analysis. Discover a 5-star review of a SIEM platform with a breakdown of its strengths, weaknesses and more.
Posted: 16 Aug 2016 | Published: 01 May 2016

LogRhythm, Inc.

Rethinking the Endpoint
sponsored by Citrix
WHITE PAPER: You'll find the answer within this short white paper. Simply put, virtualization is the key. Discover how virtualization can make life easier for your IT teams, improve security and result in significant cost savings to your organization.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Citrix

Compliance - The New Hot Button for CIOs
sponsored by VMware
WHITE PAPER: This informational white paper identifies the main purpose of compliance regulations, some of the risks that accompany enterprises who fail compliance audits, and reviews the best practices to ensure you have the right partner to meet your compliance requirements.
Posted: 16 Aug 2016 | Published: 01 Jan 2016

VMware

How to Detect a Ransomware Attack Before it's too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

DDoS Attack Stats & Trends
sponsored by Akamai
RESOURCE: This infographic shows you crucial DDoS findings for Q1 of 2016. Learn how drastically DDoS attacks have increased, which industries they've affected the most and what you can do to protect your network.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Akamai

Comparing App Security Strategies: WAFs vs. RASP
sponsored by IMMUNIO, Inc.
WHITE PAPER: Examine the current threat landscape for web applications and the approaches you should take to secure those applications. Uncover a comparison of one of the most common approaches – Web Application Firewalls (WAFs) - with the most recent addition to the application protection arsenal, Run-Time Application Self-Protection (RASP).
Posted: 16 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets
sponsored by Schneider Electric
WHITE PAPER: This white paper details common distributed server room and remote wiring closet downtime incidents and poses recommendations for how monitoring and automations software integrated with video surveillance and sensors can reduce human error related downtime.
Posted: 16 Aug 2016 | Published: 03 Feb 2015

Schneider Electric

Security Analytics is the Cornerstone of Modern Detection and Response
sponsored by RSA
WHITE PAPER: Within this white paper, read what Forrester Consulting discovered in their survey of 180 security professionals from countries around the world. Understand why mature organizations are moving to security analytics to mitigate today's advanced cyber threats and how SA can greatly improve your recognition of threat impacts.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

RSA
1 - 25 of 794 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement