IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
101 - 125 of 771 Matches Previous Page  |  Next Page
Success Story Video: State of California
sponsored by Axway
VIDEO: Find out how the State of California was able to about a managed file transfer (MFT) system to centrally manage and monitor secure file transfers across all their web sites and applications for all their agencies.
Posted: 17 Jun 2016 | Premiered: 01 May 2016

Axway

Addressing the Problem of Business Email Compromise
sponsored by Cloudmark
WEBCAST: Using recent examples, Gartner Research Director Perry Carpenter shows you how to prevent future spear phishing attacks and what capabilities your spear phishing solution needs in order to be effective.
Posted: 17 Jun 2016 | Premiered: May 1, 2016

Cloudmark

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Stop Ransomware with Carbon Black
sponsored by Carbon Black
WHITE PAPER: Re-imaging security methods will never be the right solution to this problem. Learn about the tools imperative in preventing, detecting and remidiating randsomeware threats to your endpoints. Get greater visibility through continuous monitoring throughout your whole network.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Mobile Application Security Report 2016
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover just how much of your data is being collected and to what extent applications can access your data. Learn precautionary steps you can take to make sure applications aren't grabbing data you don't want them to and make responsible choices when downloading apps.
Posted: 16 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

The Breach Detection Gap and Strategies to Close It
sponsored by Infocyte
WHITE PAPER: What's needed is a layered approach to breach discovery that includes looking for threats which have slipped past the perimeter. Discover how to catch what prevention technologies miss. Reduce the breach detection gap and learn now to mitigate the possible damage caused by prolonged unauthorized access.
Posted: 15 Jun 2016 | Published: 01 May 2016

Infocyte

Clustering for Axway SecureTransport
sponsored by Axway
WHITE PAPER: Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Get proven expertise to leverage an enhanced MFT gateway that supports Standard Clustering and Enterprise Clustering to meet a wide range of capacity requirements and help your organization ensure business continuity.
Posted: 15 Jun 2016 | Published: 31 Dec 2012

Axway

Employing Cyber Threat Intelligence
sponsored by Anomali
WHITE PAPER: Cyber threat intelligence is fast becoming a cornerstone in enterprise security but are you using your various intelligence feeds most effectively? Learn how organizations large and small are increasingly adding threat intelligence to their security posture and see what type of attacks you can mitigate using threat intelligence.
Posted: 15 Jun 2016 | Published: 01 Feb 2016

Anomali

Timeline of Disruption- A history of disrupting the business of hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn about the history of enterprise security: from its conception until today. See how hacking has disrupted business innovation over the years and understand why your organization must continue to innovate fearlessly.
Posted: 15 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

How business innovations meet the business of hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Hackers are sophisticated but what does that mean for your business? Explore the business of hacking. Discover the different ways cybercriminals make money, their motivations and different hacking organizations.
Posted: 14 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Axway SecureTransport Enhanced Managed File Transfer Gateway
sponsored by Axway
WHITE PAPER: Handle everything from high-volume automated file transfers between systems, sites and lines of business to user-driven communications and mobile file sharing. Ensure you're ready for high-growth uses cases while maintaining corporate controls and visibility.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Axway

Log Monitoring & Analysis: Strengthen Information Security While Respecting User Privacy
sponsored by Intersect Alliance
EGUIDE: Log monitoring and analysis tools can be used to bolster information security and improve incident response without infringing on user privacy. In this expert e-guide, security pros evaluate options based on criteria such as alerts and reporting capabilities.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intersect Alliance

Lighting a Path to PCI Compliance
sponsored by Illumio
WHITE PAPER: Adaptive Security Platforms (ASP) can ensure PCI compliance and audit preparation across a wide spectrum of standards. Read on to uncover how your enterprise can protect cardholder data, implement strong access control measures, maintain an information security policy, and more.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Illumio

Putting the “Secure” in Secure Remote Access
sponsored by Citrix
WHITE PAPER: Security pros today are challenged to establish comprehensive protection for all kinds of remote access use cases. Learn how you can deliver a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Posted: 13 Jun 2016 | Published: 01 May 2016

Citrix

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc.
EGUIDE: This e-guide highlights the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 13 Jun 2016 | Published: 21 Mar 2016

Dell, Inc.

Most Effective Security Technologies and Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how understanding the business of hacking and how cybercriminals profit can help you develop a successful security strategy.
Posted: 13 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Make Emm Part Of a Broader Mobile Enterprise Strategy
sponsored by Microsoft
EGUIDE: If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Microsoft

Internet of Things: Enterprise Risks, Platform Options to Consider
sponsored by Xively by LogMeIn
EGUIDE: The Internet of Things (IoT) increases the number of security risks businesses face, becoming a backdoor for attackers into the enterprise. Discover 7 key security risks associated with IoT and how to manage them. Plus learn how robust cloud platforms will allow IoT to reach its potential.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Xively by LogMeIn

What Healthcare Executives Must Know About Data Breaches
sponsored by Coalfire
EGUIDE: BYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.
Posted: 10 Jun 2016 | Published: 02 Jun 2016

Coalfire

Fraud risk engines strike back
sponsored by IBM
WHITE PAPER: Discover how to approach fraud detection in a new way. You must base your stance on three core principles —visibility, a global threat intelligence network, and agility by design. By using this approach, you can significantly reduce the number of false positives and can improve customer satisfaction.
Posted: 10 Jun 2016 | Published: 01 Feb 2016

IBM

Fraud protection doesn't have to be an uphill battle
sponsored by IBM
WHITE PAPER: You can simplify the fraud protection process while reducing time and cost. Learn how to achieve greater visibility and adaptability across the fraud management lifecycle and discover highly effective intelligence- and evidence-based fraud detection with fewer false positives.
Posted: 10 Jun 2016 | Published: 01 May 2016

IBM

Companies Cautiously Optimistic about Cybersecurity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the realistic possibilities of your business experiencing an attack and what you can do to prepare your network. Uncover 5 action items for security pros, 4 "bad guys" to look out for, and much more.
Posted: 10 Jun 2016 | Published: 27 Jan 2016

Hewlett Packard Enterprise

SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security
101 - 125 of 771 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement