Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed   
Business Risk Analysis Reports
Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

Working Toward GDPR Compliance
sponsored by SAS
WHITE PAPER: According to a SAS survey, 54% of large organizations are fully aware of the impact of GDPR, compared to only 37% of small organizations. This resource offers insight into the journey to GDPR compliance and explores where organizations stand in terms of their readiness.
Posted: 21 Mar 2018 | Published: 21 Mar 2018


Assessing Cyber Security
sponsored by ConvergeOne
WHITE PAPER: How does your organization measure success of cybersecurity? This resource offers a simple and clear way to review and assess your current information security program.
Posted: 20 Mar 2018 | Published: 20 Mar 2018


IR Customer Case Study
sponsored by IBM Resilient
CASE STUDY: To manage today's threats, organizations need a proven and robust incident response (IR) function. Explore this case study to gain insight into how a top global research laboratory overcame the issue where its IR was inadequate; it lacked flexibility, control, and more.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

IBM Resilient

User Behavior Analysis & SIEM
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.

Magic Quadrant for Intrusion Detection and Prevention Systems
sponsored by Alert Logic
RESEARCH CONTENT: Did you know by 2020, 70% of new stand-alone intrusion detection and prevention systems (IDPS) placements will be cloud-based? Inside this Gartner Magic Quadrant Report, uncover the pros and cons of IDPS providers like Hillstone Networks, Alert Logic, Cisco and more to help you choose the right network security solution to meet your business need.
Posted: 12 Mar 2018 | Published: 10 Jan 2018

Alert Logic

IoT and the New Security Challenge
sponsored by Juniper Networks
WEBCAST: According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.
Posted: 19 Feb 2018 | Premiered: Feb 19, 2018

Juniper Networks

Cloud Security: Making Sense of the Shared Responsibility Model
sponsored by Oracle Corporation
WHITE PAPER: For enterprises using cloud services, there's a lot of confusion surrounding the shared responsibility model, particularly with what security measures the enterprise must provide. This resource explores the root cause behind this confusion and offers examples of how enterprises are successfully addressing and embracing the model.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Oracle Corporation

Vendor Comparison: Automated Malware Analysis
sponsored by McAfee, Inc.
RESEARCH CONTENT: Automated malware analysis is growing because more security professionals trust the technology to act as their highest fidelity alert. McAfee Take a look at this Forrester Report to see how vendors compare in regard to malware protection.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

McAfee, Inc.

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
RESOURCE: This infographic summarizes key findings of the 2017 Ponemon Juniper Report detailing why automation technologies are joining forces with current security strategies.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Juniper Networks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement