IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
26 - 50 of 403 Matches Previous Page  |  Next Page
Sluggish Incident Response Report:: Next-Gen Security Problems and Solutions
sponsored by FireEye
WHITE PAPER: Identify the issues plaguing network incident response processes and combat shortcomings like limited human resources. Access this report now to glean an overview of the outside security services that your organization can procure to eliminate sluggish incident response.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Preparing for the Next Attack: Evaluate Your Network Security with Incident Response
sponsored by FireEye
WHITE PAPER: This guide will help you evolve your ability to respond to critical security incidents. Access this paper to uncover the 6 core capabilities to keep in mind as you plan and maintain your network security response plan.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Evaluate and Evolve Your Network Security Program in 10 Steps
sponsored by FireEye
WHITE PAPER: This white paper serves as a comprehensive guide for IT professionals evaluating enterprise network security. Read this report now to access the 10-step process for proper security program evaluation, how to conduct a program assessment, and more.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


The Economist – Holistic Risk Management
sponsored by SAP
WHITE PAPER: Examine a holistic and strategic risk management approach to help your organization identify, audit, and address strategic risks.
Posted: 16 Sep 2015 | Published: 02 Sep 2015


Top 7 Practices for Effective Business Continuity
sponsored by IBM
WHITE PAPER: This exclusive white paper is your roadmap to elevating business continuity management (BCM) to the enterprise risk management level. Read on to explore the top 7 practices for effective BCM.
Posted: 04 Sep 2015 | Published: 04 Sep 2015


Achieve Business Continuity with Secure and Reliable Unified Communications
sponsored by ThinkingPhones
WHITE PAPER: This white paper provides 5 steps to educating yourself on the common pitfalls when investing in a unified communications platform. Access this paper now to get insight into achieving long-term security and stability with UC.
Posted: 02 Sep 2015 | Published: 02 Sep 2015


Optimized Sourcing in Hybrid IT Environments: Impacts and Improvements
sponsored by IBM
WHITE PAPER: This research paper discusses how hundreds of organizations feel about multiple-sourced hybrid IT, how to predict upcoming service needs, and how to manage IT acquisition in a way that will optimize environments.
Posted: 01 Sep 2015 | Published: 30 Apr 2014


Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013


Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, highlights the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.

Maximize ROI by Deploying Strategic Partners in UC&C
sponsored by Polycom, Inc.
WHITE PAPER: In this white paper, you will learn how to minimize deployment risk, while providing IT leaders with a rock-solid deployment with minimal challenges. Learn how to integrate your existing UC infrastructure with potential new voice/video vendors, as well as how to strategize with your partners and leverage your relationship with them.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Polycom, Inc.

Bolstering Your Enterprise Mobility Security Strategy for Today's App Landscape
sponsored by Oracle Corporation
WHITE PAPER: This quick and easy guide outlines the benefits of employing enterprise mobility management (EMM) in your organization, and also highlights the particular risks facing BYOD users in the mobile app landscape.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Oracle Corporation

Survey: Security Spending and Preparedness in the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: In this report, you'll find the results of a survey that reveals how financial organizations are adapting to new security concerns and how they need to do better.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

From Project to Product
sponsored by Red Hat
WHITE PAPER: Software developed by an open source community with testing, certification, documentation, training and support can help IT organizations experience lower middleware with total cost of ownership and risk. Read this white paper to learn about the benefits of open source technology.
Posted: 03 Aug 2015 | Published: 31 Dec 2014

Red Hat

Securing Information in the New Digital Economy
sponsored by Oracle Corporation
WHITE PAPER: This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Oracle Corporation

4 Secrets to Meaningful Security Discussions with the Board Of Directors
sponsored by Citrix
WHITE PAPER: Security is of greater interest to corporate boards than ever before, and an effective security strategy is crucial. This white paper highlights 4 ways to engage your board of directors in a meaningful discussion about security-related risks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015


Strategic Migration Planning Guide: WebSPHERE to JBoss Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: This migration planning guide provides a five-step process designed to identify migration opportunities, examine risks, create a standard enterprise environment, and develop a strategic migration plan. Read now for insight into the considerations and processes required to move to an enterprise app platform.
Posted: 28 Jul 2015 | Published: 30 Sep 2014

Red Hat

Gartner Security & Risk Management Summit 2015: Schedules, Speakers, and More
sponsored by Gartner
WHITE PAPER: Access the following brochure to learn about the various topics, schedules, and strategies that will be covered during this year's Gartner Security and Risk Management Summit. Read on to learn will be speaking, future technology predictions, and more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015


The Cost of a Data Breach in 2015
sponsored by IBM
WHITE PAPER: This white paper provides the full details on the 2015 cost of a data breach study and shows you how to adequately protect your data. Read on to learn more about why the costs of data breaches have increased, and how you can avoid these costs.
Posted: 10 Jul 2015 | Published: 31 May 2015


Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Enterprise

The Cloud at Your Pace
sponsored by Rackspace
WHITE PAPER: Access this white paper for the 8 top cloud concerns and learn how you can address them, while minimizing your risks, and moving to the cloud at your own pace.
Posted: 13 May 2015 | Published: 13 May 2015


Faster Speed-to-Market Through Secure Information Sharing
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how to securely manage file systems and reduce complexity. Read on now to learn how to simplify data sharing with partners without the risk of data loss.
Posted: 28 Apr 2015 | Published: 04 Dec 2013

IntraLinks, Inc

Data Breach Risk Calculator
sponsored by IBM
RESOURCE: This brief infographic can help you calculate the cost of a data breach by using factors such as your location and your industry. Access it now to learn just how much your organization stands to lose.
Posted: 17 Apr 2015 | Published: 30 Dec 2014


Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014


2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Enterprise
RESOURCE: If you want to avoid the costs of cybercrime, you need to know what you're up against. This resource can help.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Hewlett-Packard Enterprise

Governance rules to navigate data mobility and velocity complexities
sponsored by
VIRTUAL ENVIRONMENT: Mobile devices have become the Internet's dominant user interface, complicating GRC strategy for many companies. In this classroom, learn governance strategies to remain regulatory compliant as digital assets are increasingly available to users anywhere, at any time.
Posted: 12 Mar 2015 | Premiered: 09 Mar 2015
26 - 50 of 403 Matches Previous Page    1 2 3 4 5    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement