IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 645 Matches Previous Page  |  Next Page
Protecting Your Business in the Digital Transformation Journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: As digital transformation shifts the risk landscape, IT security must change with it. In this white paper, discover the nature of this shit, as well as the role mobile devices play in modern security networks, how a BI program can help you build a comprehensive security program, successful strategies used by other mid-market companies, and more.
Posted: 17 Jan 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

Global Risks Report 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 13 Jan 2017 | Published: 13 Jan 2017

ComputerWeekly.com

Application Security Testing Vendor Evaluations
sponsored by Veracode, Inc.
ANALYST REPORT: This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.
Posted: 12 Jan 2017 | Published: 06 Aug 2015

Veracode, Inc.

IT Security 101: Think Like A Cybercriminal
sponsored by Solarwinds MSP
EBOOK: In this ebook, learn about the motivations and tactics used by hackers, so that you can ensure your systems and data are adequately protected. Access now to discover the 6 key things to consider when assessing your IT security plan.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Solarwinds MSP

Secure, Cloud-Managed Wifi
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this white paper, learn how to implement Wi-Fi in safe, protected airspace without the normal administrative headaches.
Posted: 10 Jan 2017 | Published: 11 Dec 2016

WatchGuard Technologies, Inc.

Focus: Securing for the future
sponsored by ComputerWeekly.com
EGUIDE: 2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

ComputerWeekly.com

Malware Prevention vs. Detect and Respond
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell, Inc. & Intel®

Insights Into How Math Can Defeat Malware
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Malware has always evolved faster than security measures could keep up...until now. Access this white paper to learn about a math and machine-learning approach that enables you to identify potential threats based on mathematical risk factors, so that you can make the right decisions in real time.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell, Inc. & Intel®

Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

2016 Security Pressures Report
sponsored by SingTel
WHITE PAPER: The recommendations in this resource can serve as a reliable compass for where your security efforts need to be going into the future. These best practices will not only placate security pressure, but also help make your organization more secure overall.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

IoT Strategy: 8 Key Questions to Ask
sponsored by Cisco Systems, Inc.
WHITE PAPER: IoT introduces tremendous risk if the connected products and services are not designed, deployed and supported properly. The 8 questions presented in this white paper provide a step-by-step approach for turning an IoT vision into reality.
Posted: 29 Dec 2016 | Published: 30 Nov 2016

Cisco Systems, Inc.

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

How to Transform Employee Worst Practices Into Enterprise Best Practices
sponsored by KnowBe4
WHITE PAPER: Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

The Phishing Breakthrough Point
sponsored by KnowBe4
WHITE PAPER: Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Employees at the Frontline in the Battle Against Ransomware
sponsored by KnowBe4
WHITE PAPER: In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Firewall Sprawl: Four Security Gaps Exposed
sponsored by FireMon
WHITE PAPER: Discover the truth surrounding next-generation firewalls (NGFWs). Learn the four firewall security gaps that could be putting your organization at risk, and the proper management processes to patch those gaps.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

FireMon

Security Analytics Brings Data-Driven Security Into The 21st Century
sponsored by FireMon
RESOURCE: With security analytics, security professionals see opportunities for faster incident response, more efficient staff and better business alignment. In this Forrester report, learn how you too can streamline security operations using SIEM systems and enable more efficient, data-centric threat analysis.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

Firewall Clean Up Recommendations
sponsored by FireMon
WHITE PAPER: At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

Buyers guide to cloud based I&M mgmt
sponsored by IBM
RESOURCE: Learn how to make the most informed decision about your next enterprise grade IDaaS provider with this interactive buyer's guide.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

IBM

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
WHITE PAPER: Discover why and how IT security strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.
Posted: 06 Dec 2016 | Published: 30 Nov 2016

arcserve

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

Comparing Data Protection and Information Management Vendors
sponsored by Commvault
WHITE PAPER: Uncover a comparison of two data protection and information management vendors (Veeam and Commvault). Learn how they compare on 5 important factors that you should be considering when looking to purchase data protection and information management.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by Fortinet, Inc.
EGUIDE: What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.
Posted: 14 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.
1 - 25 of 645 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement