IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentReports
1 - 25 of 435 Matches Previous Page  | Next Page
Compliance for Cloud Environments Simplified
sponsored by CloudPassage
WHITE PAPER: This white paper introduces Halo, which automates security controls for compliance without compromising cloud efficiency.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: Download this exclusive whitepaper now to learn about three use cases that can help you identify, quantify, and mitigate risk throughout your environment.
Posted: 25 Nov 2014 | Published: 15 Apr 2014

BitSight

Tis the Season for Safer Shopping? Assessing the Security Performance of the Retail Industry
sponsored by BitSight
WHITE PAPER: Last holiday season the security shortcomings of the retail industry were on full display with the Target breach and other high-profile incidents. So, have they made any significant changes to move from the naughty to nice list this year?
Posted: 25 Nov 2014 | Published: 25 Nov 2014

BitSight

Cloud Infrastructure Security: It's Time to Rethink Your Strategy
sponsored by CloudPassage
WHITE PAPER: This white paper discusses why, in order to truly reap the benefits of the cloud, leaders need to rethink their approach to infrastructure security.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

CloudPassage

Utilizing Security Ratings for Enterprise IT Risk Mitigation
sponsored by BitSight
WHITE PAPER: Continue on to this important whitepaper now to explore the state of cyber-risk management in 2014.
Posted: 20 Nov 2014 | Published: 18 Jun 2014

BitSight

2014 Cost of Cyber Crime Study: Australia
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the economic impact of cyber-crime on Australia in 2014.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Finding the Right Security Assessment Approach for Your Organization
sponsored by Dell SecureWorks
WHITE PAPER: Download this exclusive whitepaper to determine how you should be assessing your security and explore test options.
Posted: 19 Nov 2014 | Published: 13 Nov 2013

Dell SecureWorks

Addressing the Full Attack Continuum- A New Security Model For Before, During and After an Attack
sponsored by Cisco
WHITE PAPER: This important whitepaper will teach you how to develop a threat-centric security approach.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Cisco

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: This exclusive whitepaper offers up 10 tips for improving your incident response capabilities.
Posted: 14 Nov 2014 | Published: 14 Nov 2013

Dell SecureWorks

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

How Tenable Optimized Vulnerability Management for Crosskey Banking Solutions
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how Crosskey Banking Solutions worked with Tenable Network Security to reduce risk and ensure PCI DSS compliance.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Tenable Network Security

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

Security Analytics and Intelligence Survey 2014
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey of 350 IT professionals explores how IT security teams use security analytics and intelligence to help detect cyber attacks.
Posted: 12 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

How to Protect Critical Data while Maintaining Ease of Use
sponsored by Gemalto
WHITE PAPER: This exclusive whitepaper explores how you can strike a balance between security and convenience.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Know Your Endpoints to Prevent Security Breaches
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers how an IBM assessment can show you how secure your endpoints really are.
Posted: 11 Nov 2014 | Published: 13 Sep 2012

IBM

Maximum Availability Architecture (MAA) Assessment Tool: Assess Your High Availability Readiness
sponsored by Oracle Corporation
ASSESSMENT TOOL: Use this assessment tool to learn about your service-level expectations, database architecture, and planned maintenance practices. You can quickly assess your organization's level of risk exposure, and also learn how to protect your business and grow your ROI.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Oracle Corporation

How to Deal with Increasing DDOS Attacks
sponsored by Verisign, Inc.
EGUIDE: This expert e-guide explores how to protect your organization from distributed denial of service attacks.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Verisign, Inc.

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

Risk & Compliance Monitoring
sponsored by Software AG
VIDEO: This exclusive video covers a platform-based solution with real-time analytics that can help you manage risk and stay compliant.
Posted: 07 Nov 2014 | Premiered: 07 Nov 2014

Software AG

The Role of Third-Party Applications in APT
sponsored by Lumension
WEBCAST: This valuable webcast explores how criminals are using advanced persistent threats to penetrate organizations defenses for weeks at a time.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Lessons Learned from the Target Data Breach
sponsored by Lumension
WEBCAST: This exclusive webcast explores key lessons learned from the high-profile security breaches in 2013.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper reveals the results of a study on why senior executives must get involved in breach management.
Posted: 06 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

XP 5 Ways to Mitigate Risk
sponsored by Lumension
WEBCAST: This exclusive webcast offers five ways to mitigate risk when running XP after Windows discontinues support.
Posted: 05 Nov 2014 | Premiered: Nov 5, 2014

Lumension
1 - 25 of 435 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement