IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
176 - 200 of 796 Matches Previous Page  |  Next Page
An Operational Model for Breach Analytics and Intelligence
sponsored by Anomali
WHITE PAPER: In the face of this situation, a new approach to security strategy and operations must be adopted. Discover an approach that focuses on operational relevance, reducing adversary dwell time and speeding incident response activities.
Posted: 06 Jun 2016 | Published: 01 May 2016

Anomali

Find, Classify, Protect your data
sponsored by Verizon
WHITE PAPER: Understanding, identifying and classifying your data correctly are the first steps in information security. Learn how to evaluate your data landscape and create a plan to manage and secure it.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Verizon

Why Today's Phishing Attacks are Harder to Detect
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.
Posted: 06 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Encryption as an IT Service
sponsored by Gemalto
WHITE PAPER: To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

Gemalto

The Convergence of IT Security and Physical Access Control (PACS): Why Now and How it Works
sponsored by HID
WHITE PAPER: In this paper, you will learn what is driving the convergence between IT security and physical access control. Discover how creating a single identity for IT Security and physical access control can benefit your organization, while providing a better experience for your employees.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

vanGO® One-2-One™ Personalized Security
sponsored by HID
WHITE PAPER: With several different card, hardware and software options available, designing the right solution for your organization is easy. vanGO is a total solution consisting of cards, hardware and software that work together to create a simple, secure, and cost-effective system.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

HID

Encrypt Office 365 Emails
sponsored by ZixCorp
RESOURCE: Passive identification of what emails should be encrypted can simultaneously protect your business while unburdening your system from unnecessary processes. Discover how to automatically scan outbound emails from Office 365 connectors and accurately detect sensitive information and evolve with changing best practices.
Posted: 03 Jun 2016 | Published: 01 May 2016

ZixCorp

CISOs Are Under Mounting Pressure
sponsored by MASERGY
ANALYST BRIEF: CISOs need help. The smart ones are turning to a new way of thinking about cybersecurity protection: Security as a Service. It's a managed, unified solution that leverages the power of both machine learning and expert human intelligence. Discover the scalability and speed SaaS can add to your organization.
Posted: 03 Jun 2016 | Published: 13 Jan 2015

MASERGY

Intermedia Builds an Instant Security Operations Center and Speeds Business Processes
sponsored by Splunk
CASE STUDY: This case study demonstrates how Intermedia overcame its cloud security challenges and boosted productivity with data-driven analytics and incisive, enterprise-wide intelligence.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Splunk

Make Behavioral Analytics Part of Your Security Strategy
sponsored by MASERGY
RESOURCE: Discover how behavioral analysis work and learn how it can benefit your network security. Shift your focus from blocking and preventing breaches to detecting and rapidly responding to attacks.
Posted: 03 Jun 2016 | Published: 05 Aug 2015

MASERGY

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM MaaS360
WHITE PAPER: This white paper shows you a comprehensive portfolio of mobile security solutions that address four key mobile security challenges. Learn intelligent, integrated and innovative approaches that can help your organization stay ahead of emerging threats while managing operational risks and lowering cost of a strong security posture.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM MaaS360

The State of Mobile Security Maturity
sponsored by IBM MaaS360
WHITE PAPER: This study takes the mobile security pulse of large enterprises worldwide. It'll help you assess where you are on this emerging mobile security maturity scale and giving you an indication of where you should make your mobile security investments moving forward.
Posted: 03 Jun 2016 | Published: 31 Dec 2014

IBM MaaS360

Securing mobile productivity for Microsoft Office 365
sponsored by IBM MaaS360
WHITE PAPER: Take the complexity out of securing your mobile workforce. Learn how to secure your Microsoft ecosystem across all mobile platforms, including Windows 10. Enable IT to efficiently manage enterprise productivity, connectivity and security today and into the future.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Protect Confidential Data While Keeping Mobile Users Productive
sponsored by IBM MaaS360
WHITE PAPER: Common sense dictates that you look for ways to supplement your mobile device management (MDM) solution with additional, more robust security controls. This white paper helps you identify the goals for your MDM security strategy and select the best approach to reach those goals.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Setting new standards in cardholder data protection
sponsored by Verizon
WHITE PAPER: Learn how CartaSi implemented powerful new vulnerability scanning and penetration testing capabilities into its security process, adding new layers of defense to its customer web portals. Get Broader enhancements to data protection with the ability to monitor security-related trends across multiple portals.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Recognize and Respond to Cyber Attacks
sponsored by Verizon
WHITE PAPER: The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Bank Invests in Centralized Security Visibility to Promote Business Intelligence
sponsored by Splunk
CASE STUDY: Read this case study to determine how Orrstown Bank leveraged a cloud security platform to provide increased visibility into its complex hybrid IT infrastructure, resolve threats and maintain required compliance.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Splunk

Build a common identity profile and hub out of disparate identity sources
sponsored by Radiant Logic, Inc.
WHITE PAPER: Discover how to renew your existing IAM investments, making them a strategic infrastructure solution that supports current identity needs and adapts quickly to future requirements as they arise.
Posted: 02 Jun 2016 | Published: 01 May 2016

Radiant Logic, Inc.

The Rise of the Cloud Security Professional
sponsored by (ISC)2 UK Ltd
WHITE PAPER: The problem with implementing a secure cloud strategy comes in the lack of understanding around how to define cloud computing and its risks. By employing credentialed cloud security professionals, you can ensure your organizations is using the today's best practices that can maintain secure cloud computing infrastructures.
Posted: 01 Jun 2016 | Published: 31 Dec 2015

(ISC)2 UK Ltd

Get Help Tracking Down the Leak
sponsored by Exabeam
WHITE PAPER: Learn how to best utilize UBA and threat hunting in your security intelligence platform to proactively catch unwanted activity across your network.
Posted: 31 May 2016 | Published: 01 Apr 2016

Exabeam

Integrating Host Systems With Modern Security Frameworks
sponsored by Novell Ltd.
WHITE PAPER: This white paper reveals a practical way to bring your host systems into the modern security fold. Close the technology gap without jeopardizing business operations.
Posted: 31 May 2016 | Published: 01 Apr 2016

Novell Ltd.

In the Market for a New Key Manager? Then Get in on a Good Thing!
sponsored by Gemalto
WHITE PAPER: Learn four key reasons why you need to switch to a central key manager. Discover how a full portfolio of flexible encryption options that work on-premises, in traditional data centers and virtualized cloud environments.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gemalto

The Road to SDN is Paved with Visibility and Many Good Intentions
sponsored by Gigamon
WHITE PAPER: Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Emerging security threats you're up against now
sponsored by Intel
EGUIDE: Cybercrime is now a fully functional industry with "Hacking as a Service" being a top product. Services are cheaper and more sophisticated than ever. This e-guide shows you top emerging cyber threats that could be harming your system soon.
Posted: 06 Jun 2016 | Published: 25 May 2016

Intel
176 - 200 of 796 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement