IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentReports
226 - 250 of 319 Matches Previous Page  | Next Page
IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs
sponsored by Lumension
ANALYST REPORT: This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management.
Posted: 11 Aug 2009 | Published: 11 May 2009

Lumension

A Premium on Efficiency: Midsize Manufacturers Confront the Obstacles to Growth
sponsored by SAP America, Inc.
WHITE PAPER: How do best-in-class midsize manufacturers continue to grow in a tough economy? This research report, conducted by EIU, outlines measures manufacturers implement to continue expanding even while coping with the strains of softening demand in key markets, rising input costs, and downward pressure on prices.
Posted: 07 Aug 2009 | Published: 07 Aug 2009

SAP America, Inc.

What You Don't Know Will Cost You
sponsored by Sybase, an SAP company
BROCHURE: Rising trading volumes, complex assets and inaccurate assessments of risk by multiple financial partners all contributed to the recent global meltdown. Does your business rely on up-to-the-minute, accurate data? Can you get the insights you need quickly?
Posted: 06 Aug 2009 | Published: 03 Aug 2009

Sybase, an SAP company

Presentation Transcript: Be Prepared! Leverage SAP PLM to Navigate Through Uncertain Times
sponsored by SAP America, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn the business value of PLM in an uncertain economy as well as significant trends in the PLM market. Explore SAP's approach to a new generation of product lifecycle management solutions that will help you remain or become a product and services leader.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

SAP America, Inc.

The Information Governance Imperative
sponsored by RSD
WHITE PAPER: Read this paper to learn how information governance is becoming more important in today's business world and learn why your organization needs to implement an information governance strategy today and how to go about implementing one.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

RSD

The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability
sponsored by SAP America, Inc.
WHITE PAPER: Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability.
Posted: 22 Jul 2009 | Published: 03 Jun 2009

SAP America, Inc.

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

eBook: Compliance for the Midmarket: Governance, Risk and Technology
sponsored by SearchCIO.com
EBOOK: Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
Posted: 09 Jun 2009 | Published: 09 Jun 2009

SearchCIO.com

The Financial Close: Optimizing Performance and Driving Financial Excellence
sponsored by SAP America, Inc.
WHITE PAPER: The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls
Posted: 05 Jun 2009 | Published: 02 Jun 2009

SAP America, Inc.

A Complete View Of The Enterprise: Linking Operational And Financial Planning In Global Organizations
sponsored by SAP America, Inc.
WHITE PAPER: In February 2008, CFO Research Services, a unit of CFO Publishing and part of The Economist Group, began a research project with Business Objects, an SAP company, asking senior finance executives to give views on their priorities and challenges around integrating operational and financial planning processes.
Posted: 05 Jun 2009 | Published: 01 May 2008

SAP America, Inc.

eBook: Understanding GRC
sponsored by TechTarget
EBOOK: This in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.
Posted: 20 May 2009 | Published: 20 May 2009

TechTarget

Governance, Risk, Compliance: Policy Management - Methods and tools
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.
Posted: 08 May 2009 | Published: 08 May 2009

SearchSecurity.com & SearchCompliance.com

Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
sponsored by Information Security Magazine
EBOOK: Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 08 Apr 2009 | Published: 01 Feb 2009

Information Security Magazine

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by SearchCompliance.com
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

SearchCompliance.com

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by SearchCompliance.com
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

SearchCompliance.com

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by SearchCompliance.com
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

SearchCompliance.com

Lumension Vulnerability Scanner Offer
sponsored by Lumension
ASSESSMENT TOOL: This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.
Posted: 11 Mar 2009 | Published: 11 Mar 2009

Lumension

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams
sponsored by Qualys, Inc.
WHITE PAPER: This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Qualys, Inc.

Hard Hat Area: Myths and Pitfalls of Data Mining
sponsored by SPSS Inc. Worldwide Headquarters
WHITE PAPER: The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

SPSS Inc. Worldwide Headquarters

Virtualization Podcasts: Infrastructure Solutions for Midsized Companies
sponsored by IBM
PODCAST: Midsized businesses need IT solutions that will help them by cutting costs, adding capabilities and reducing risks. Hear about key technologies, trends, best practices and solutions from IBM experts, IBM Business Partners and Industry Analysts that will help you address the IT challenges facing your growing business.
Posted: 18 Feb 2009 | Premiered: Feb 18, 2009

IBM

Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER: Application security has risen to the top of the agenda for security professionals striving to control their overall risk profile. According to US Computer Emergency Response Team (US-CERT) and Gartner, 75% of new attacks target the application layer and software vulnerabilities have reached...
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Veracode, Inc.

IT Governance in an IBM Lotus Software Environment
sponsored by Sherpa Software
IT BRIEFING: This document describes concepts and definitions for governance, elements of governance, distinguishing myth from reality, approaches that go beyond "just good enough", control frameworks etc.
Posted: 16 Jan 2009 | Published: 16 Jan 2009

Sherpa Software

Ethical Hacking and Risk Assessments
sponsored by Global Knowledge
WEBCAST: Attend this webcast to learn about risk assessment process and tools used by ethical hackers.
Posted: 10 Dec 2008 | Premiered: Dec 10, 2008

Global Knowledge

CIO Decisions Ezine Volume 4: Disaster Recovery and Unified Communications
sponsored by CIO Decisions
EZINE: This eguide explains how Midmarket companies are embracing server virtualization and updating their disaster recovery strategies to ensure they minimize risk-affordably.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

CIO Decisions

Controlling Risk: Quality Management for SAP® Implementations and Upgrades
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper summarizes the benefits of using HP software throughout the SAP application lifecycle, while focusing primarily on ensuring a smooth implementation, upgrade and go live with SAP applications.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Hewlett-Packard Company
226 - 250 of 319 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement