IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentReports
226 - 250 of 335 Matches Previous Page  | Next Page
Four Steps to Cure Your Patch Management Headache
sponsored by Lumension
WHITE PAPER: Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.
Posted: 11 Feb 2010 | Published: 11 Feb 2010

Lumension

Reliability Analysis of the APC InfraStruXure Power System
sponsored by APC by Schneider Electric
WHITE PAPER: The APC InfraStruXure product line offers an alternative architecture to the central UPS. This paper summarizes the key findings of MTechnology's quantitative risk assessment and discusses their implications for facility managers and designers.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

APC by Schneider Electric

Reliability Analysis of the APC Symmetra MW Power System
sponsored by APC by Schneider Electric
WHITE PAPER: MTechnology, Inc. (MTech) performed a quantitative reliability analysis of the APC Symmetra MW UPS. The study used techniques of Probabilistic Risk Assessment (PRA) to calculate the likelihood of over 680,000 potential failure modes.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

APC by Schneider Electric

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
sponsored by Lumension
WHITE PAPER: Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Posted: 27 Jan 2010 | Published: 27 Jan 2010

Lumension

Considerations for Integrating Intelligence into Security Operations
sponsored by VeriSign EMEA
WHITE PAPER: This whitepaper outlines four critical elements of cyber security intelligence that organizations must meet to ensure that the integration of the intelligence will help improve the safety and profitability of enterprises. This paper also presents specific questions to ask when determining the best approach for an overall risk-mitigation strategy.
Posted: 23 Dec 2009 | Published: 03 Dec 2009

VeriSign EMEA

WagerWorks Takes Fraudsters Out of the Game Using iovation Device Reputation
sponsored by iovation, Inc.
CASE STUDY: In this paper WagerWorks covers how to deal with fraud challenges and resolution requirements of the casino industry.
Posted: 14 Dec 2009 | Published: 11 Dec 2009

iovation, Inc.

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth
sponsored by ESET
PRESENTATION TRANSCRIPT: The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth.
Posted: 04 Dec 2009 | Published: 03 Dec 2009

ESET

The Essentials Series: Security Information Management
sponsored by Dell SecureWorks
WHITE PAPER: This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.
Posted: 02 Dec 2009 | Published: 09 Oct 2009

Dell SecureWorks

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation
WHITE PAPER: All companies must take risks to survive, and the most successful companies are those that actively integrate risk management into their decision-making processes. This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 23 Nov 2009 | Published: 18 Feb 2009

Oracle Corporation

E-Book: Data loss prevention strategies, practices and tools
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Data loss prevention strategies, practices and tools are more important than ever. Read this e-book for expert advice on DLP, encryption, risk management and more.
Posted: 18 Nov 2009 | Published: 18 Nov 2009

SearchSecurity.com & SearchCompliance.com

Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA
sponsored by Imperva
PRESENTATION TRANSCRIPT: Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.
Posted: 12 Nov 2009 | Published: 12 Nov 2009

Imperva

Securing PostgreSQL from External Attack
sponsored by EnterpriseDB Corporation
WEBCAST: Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets.
Posted: 09 Nov 2009 | Premiered: Nov 9, 2009

EnterpriseDB Corporation

A Guide to the Value of Reliable Data in Retail Banking
sponsored by DataFlux Corporation
WHITE PAPER: This paper examines the impact of unreliable data on retail banks. Defining the requirements needed to guarantee data reliability in retail banking, it offers a practical approach to creating and governing that data, and shows how you can get started in making trusted data available to improve marketing, customer service, risk management and more.
Posted: 04 Nov 2009 | Published: 02 Nov 2009

DataFlux Corporation

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: Read this paper and learn how a successful data leak prevention system can protect your business from internal threats in this age of regulatory compliance, risk, and governance.
Posted: 07 Oct 2009 | Published: 15 Dec 2008

Mimecast

Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.
Posted: 10 Sep 2009 | Published: 16 Oct 2008

Oracle Corporation

Leveraging a Maturity Model to Achieve “Proactive Compliance”
sponsored by Symantec Corporation
WHITE PAPER: Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
Posted: 02 Sep 2009 | Published: 03 Aug 2009

Symantec Corporation

IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs
sponsored by Lumension
ANALYST REPORT: This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management.
Posted: 11 Aug 2009 | Published: 11 May 2009

Lumension

A Premium on Efficiency: Midsize Manufacturers Confront the Obstacles to Growth
sponsored by SAP America, Inc.
WHITE PAPER: How do best-in-class midsize manufacturers continue to grow in a tough economy? This research report, conducted by EIU, outlines measures manufacturers implement to continue expanding even while coping with the strains of softening demand in key markets, rising input costs, and downward pressure on prices.
Posted: 07 Aug 2009 | Published: 07 Aug 2009

SAP America, Inc.

What You Don't Know Will Cost You
sponsored by Sybase, an SAP company
BROCHURE: Rising trading volumes, complex assets and inaccurate assessments of risk by multiple financial partners all contributed to the recent global meltdown. Does your business rely on up-to-the-minute, accurate data? Can you get the insights you need quickly?
Posted: 06 Aug 2009 | Published: 03 Aug 2009

Sybase, an SAP company

Presentation Transcript: Be Prepared! Leverage SAP PLM to Navigate Through Uncertain Times
sponsored by SAP America, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn the business value of PLM in an uncertain economy as well as significant trends in the PLM market. Explore SAP's approach to a new generation of product lifecycle management solutions that will help you remain or become a product and services leader.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

SAP America, Inc.

The Information Governance Imperative
sponsored by RSD
WHITE PAPER: Read this paper to learn how information governance is becoming more important in today's business world and learn why your organization needs to implement an information governance strategy today and how to go about implementing one.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

RSD

The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability
sponsored by SAP America, Inc.
WHITE PAPER: Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability.
Posted: 22 Jul 2009 | Published: 03 Jun 2009

SAP America, Inc.

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

eBook: Compliance for the Midmarket: Governance, Risk and Technology
sponsored by SearchCIO.com
EBOOK: Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
Posted: 09 Jun 2009 | Published: 09 Jun 2009

SearchCIO.com

The Financial Close: Optimizing Performance and Driving Financial Excellence
sponsored by SAP America, Inc.
WHITE PAPER: The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls
Posted: 05 Jun 2009 | Published: 02 Jun 2009

SAP America, Inc.
226 - 250 of 335 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement