IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk AssessmentReports
26 - 50 of 408 Matches Previous Page  | Next Page
Effective Risk Assessment for Health Care Providers
sponsored by Solutionary
WHITE PAPER: In this in-depth white paper, gain critical insights into effective risk assessment implementation in today's healthcare organizations.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Solutionary

Managed Security Service Providers Vs. On-Premise SIEM
sponsored by Solutionary
WHITE PAPER: This informative white paper compares the strengths and weakness of on SIEM products with the MSSPs, including the financial, operational, and organizations considerations of each.
Posted: 05 Sep 2014 | Published: 13 Mar 2014

Solutionary

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

Top 7 Steps for Better DoS and DDoS Protection
sponsored by Solutionary
WHITE PAPER: In this essential white paper, discover the top 7 steps to help prevent these cyber-attacks and minimize their impact.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

Solutionary

Piercing the Veil of Masked Cyber Criminals
sponsored by DomainTools
WHITE PAPER: In this helpful white paper, discover a new security solution that can help you identify cyber criminals, build a cyber-attack profile, and more effectively protect your valuable data and assets.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

8 Simple Steps to Bring Shadow IT into the Light
sponsored by Rackspace
WHITE PAPER: This in-depth white paper outlines the 8 essential steps for IT professionals to drag Shadow IT into the light and regain control of their organization.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Rackspace

Internal Audit: Challenges and Solutions to Alignment
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this whitepaper, learn how Internal Audit (IA) can benefit from partnering with these organizational groups while maintaining a certain level of independence.
Posted: 02 Sep 2014 | Published: 01 Oct 2013

RSA, The Security Division of EMC

2014 Global Threat Intelligence Report
sponsored by Solutionary
RESOURCE: This critical report outlines today's most dangerous cyber threats and the key security strategies that will keep your organization protected.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Solutionary

App Security: Decompiling Android APK Files
sponsored by CDW Corporation
EGUIDE: In this informative e-guide, expert Andrew Hogg takes you through the steps of reverse-engineering Android applications for the purpose of scoping out security weaknesses.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

Address Changing Business Realities with Enhanced Business Continuity Management
sponsored by IBM
WHITE PAPER: This in-depth resource outlines a new approach to BCM that allows companies to make the changes they need in order to be more competitive while protecting its reputation and future.
Posted: 29 Aug 2014 | Published: 30 Sep 2013

IBM

Countering Cyber Threats with Behavioral Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

RSA, The Security Division of EMC

Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA, The Security Division of EMC

Reputational Risk and IT in Utilities Industry
sponsored by IBM
WHITE PAPER: This white paper explores how security and business continuity strategies can shape the reputation and value of an organization. It also explains how organizations are shifting their risk strategies to meet new demands.
Posted: 27 Aug 2014 | Published: 31 Oct 2012

IBM

Reputational Risk and IT in the Digital Age
sponsored by IBM
WHITE PAPER: This white paper examines how security and business continuity can shape the reputation and value of your company in the digital age.
Posted: 26 Aug 2014 | Published: 31 Oct 2012

IBM

Security Report 2014: Trends and Developments in the Security Industry
sponsored by IBM
WHITE PAPER: In this informative report, discover the most important security trends of last year, ranging from malware delivery to mobile device risks.
Posted: 26 Aug 2014 | Published: 28 Feb 2014

IBM

Advanced Endpoint and Server Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Bit9 + Carbon Black

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Reducing the Reputational Impact of Data Breaches and Cyber-Attacks
sponsored by IBM
WHITE PAPER: This informative white paper explores the top strategies and techniques to protect your reputation by increasing business resilience and IT security across the enterprise.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

IBM

Endpoint Threat Detection, Response, and Prevention for Dummies
sponsored by Bit9 + Carbon Black
EBOOK: In this in-depth eBook, gain critical insights into how organizations are targeted by advanced threats, and how your endpoints, servers, and other devices can function as entrances into your network for cyber criminals.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Be Ready for Cyber-Attacks with New Endpoint Security and Monitoring Solutions
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this helpful white paper, uncover a new endpoint threat detection platform that can prepare your organization to fight back against inevitable cyber-attacks.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

Ponemon Report: The Real Cost of Cyber Crime in 2013
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this Poenmon study to discover the average cost to businesses of cyber crime, and how organizations can take steps to reduce security risks and costs.
Posted: 22 Aug 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

Ponemon Study: The Real Cost of Data Breaches in 2014
sponsored by IBM
WHITE PAPER: In this Ponemon study, get the facts on whether your organization might be the target of a devastating cyber-attack, and on the proven methods for best protecting and preserving your business.
Posted: 22 Aug 2014 | Published: 31 May 2014

IBM

7 Essential Practices for Business Continuity Management
sponsored by IBM
WHITE PAPER: In this informative white paper, uncover a tested approach to expanding Business Continuity Management into an integrated, enterprise-wide program.
Posted: 22 Aug 2014 | Published: 30 Apr 2014

IBM
26 - 50 of 408 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement