IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
176 - 200 of 630 Matches Previous Page  |  Next Page
Next Generation Endpoint Protection Buyer's Guide
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about next-generation endpoint protection that can detect and prevent threats on endpoints using a unique behavior-based approach.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

What You Need to Know About Vendor Risk Management in Financial Institutions
sponsored by BitSight
WHITE PAPER: This white paper discusses several proactive tips for better vendor risk management (VRM) practices that you can quickly put into place. Learn to overcome challenges faced within the financial industry for taking on VRM and how you can adopt these security secrets and keep pace with today's growing threat landscape as advanced threats persist.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

BitSight

Secure Retail Eases the BlackBerry to iOS Transition
sponsored by IBM MaaS360
CASE STUDY: In this white paper, you will discover a comprehensive security solution for iOS devices that has a clean and intuitive interface with easy reporting and usage tracking for expense management. Read on to meet your key functionality requirements for your mobile policies and safely incorporate iOS into your MDM.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

IBM MaaS360

The Benefits of Investment in Threat Detection
sponsored by ThreatConnect
EGUIDE: This e-guide shows you the value of advanced threat intelligence and why you shouldn't skimp when it comes to protecting your organization's valuable data. Access now for examples from various IT companies about how they justify spending money without seeing a tangible ROI.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

ThreatConnect

A Guide to 12 CyberSecurity Metrics You/Your Vendors Should be Watching
sponsored by BitSight
WHITE PAPER: This white paper details 12 actionable metrics that can help you specifically assess how your organization is doing with its current cybersecurity.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

BitSight

Cyber Security Intelligence Index for Manufacturing
sponsored by IBM
WHITE PAPER: This research report offers a high-level overview of the major threats trending across businesses worldwide over the past year.
Posted: 04 Mar 2016 | Published: 31 Dec 2015

IBM

IBM Report: Securing the C-suite
sponsored by IBM
WHITE PAPER: This white paper helps you understand the risks and vulnerabilities your network probably has and how to stop them from being exploited.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

IBM

The ABC of Security Strategy
sponsored by IBM
WHITE PAPER: This white paper highlights challenges organizations typically face in implementing effective security strategies. Learn how to manage risk and gain a competitive advantage in your field.
Posted: 03 Mar 2016 | Published: 31 Jan 2016

IBM

E-book: Cyberthreat Intelligence
sponsored by LogRhythm, Inc.
EBOOK: This e-book shows you how you can identify high-impact threats and how to neutralize them before you're breached.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

LogRhythm, Inc.

The Value of Threat Modelling
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway information security thesis series gives an overview of the value of threat modelling and describes some common modelling techniques.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ComputerWeekly.com

Dell Data Protection: Rapid Recovery
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, find out how you can protect anything, anywhere: systems, apps and data – fast and easy. Gain a reliable, admin-friendly solution that can be deployed as software or in scalable appliance form factors with all capabilities included.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Dell, Inc.

The Forrester Wave: Information Security Consulting Services
sponsored by IBM
WHITE PAPER: This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

IBM

Scaling big data analytics
sponsored by LogRhythm, Inc.
VIDEO: This video shows you how to reduce to the time to detect and respond to threats as they come through your network. Find out how you can use machine-driven, real-time behavioral analytics, rapid forensic search and automated response to keep your network safe.
Posted: 01 Mar 2016 | Premiered: 21 Dec 2015

LogRhythm, Inc.

Neutralization of a Phishing Attack
sponsored by LogRhythm, Inc.
VIDEO: This video shows you a solution for faster detection and response. Gain unified security intelligence and analytics and end to end threat lifecycle management through this read.
Posted: 01 Mar 2016 | Premiered: 22 Feb 2016

LogRhythm, Inc.

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Next-Generation Endpoint Security
sponsored by Carbon Black
WHITE PAPER: This white paper provides a description of the requirements needed for Next-Generation Endpoint Security and the information you need to successfully protect your organization.
Posted: 07 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

Breach Detection: What you need to know
sponsored by Carbon Black
WHITE PAPER: This e-book outlines the tactics today's advanced attackers use to steal your sensitive data and why you need a defense-in-depth cybersecurity program that incorporates automatic detection with incident response.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Third-Party Risk Management: Evaluating and Contracting with Vendors
sponsored by BitSight
EGUIDE: This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight

Advanced Threat Hunting with Carbon Black Enterprise Response
sponsored by Carbon Black
WHITE PAPER: This white paper covers the capabilities necessary to proactively and efficiently hunt for threats across your enterprise. Learn how to expand detection beyond the point of compromise.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Every Second Counts: Unravel the entire attack and disrupt attacker behavior
sponsored by Carbon Black
WHITE PAPER: Access this white paper and find out how one solution can unravel an entire attack and disrupt the attacker's behavior to help you stay ahead. Learn how your organization can benefit from complete endpoint visibility, faster detection of advanced threats, more effective remediation, and much more.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

The Evolution of Network Security Hardware
sponsored by Aruba Networks
EGUIDE: This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Securing Your Network in the Wireless Age
sponsored by Aruba Networks
EGUIDE: In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Data Sheet: Carbon Black Security Solution Overview
sponsored by Carbon Black
WHITE PAPER: This white paper shows you how to enable your organization to disrupt advanced attacks and deploy the best prevention strategies for your business. Learn how to achieve real-time visibility in your network.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Carbon Black Enterprise Protection
sponsored by Carbon Black
WHITE PAPER: This white paper shows you a next-generation endpoint threat prevention solution that delivers a portfolio of protection policies, real-time visibility across environmnet and comprehensive compliance rules in a single platform.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Carbon Black
176 - 200 of 630 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement