Business of Information Technology  >   Business Management  >   Risk Management  >  

Environmental Health

RSS Feed   
Environmental Health Reports
 
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

GroupHEALTH Boosts Optional Coverage Sales with Xpertdoc Smart Forms
sponsored by Xpertdoc
CASE STUDY: How did GroupHEALTH, an employee benefit plan administrator, reduce the cost of managing enrollment by 20-25%? Download this case study to explore how Xpertdoc's Smart Form technology helped this benefit administrator resolve their negative brand image, improve enrollee accessibility, and increase its optional coverage sales by 5,000%.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

Xpertdoc

Rethinking Data Security
sponsored by Forcepoint
: The traditional network security perimeter has dissolved, primarily because of the rise of mobile employees and the adoption of cloud services. The result of this is overwhelmed security teams. In this white paper, learn how Forcepoint's Dynamic Data Protection helps organizations solve the fundamental challenges of traditional DLP deployments.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Forcepoint

3 Keys to Managing Vendor Risk in Financial Services
sponsored by ServiceNow
WHITE PAPER: With near-daily security breaches, every business should have risk management at the top of its to-do list. Many financial institutions don't recognize the need to look beyond their own systems. The solution to this is a vendor risk management process that allows organizations to prioritize each vendor based on the risk they pose to the business.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

ServiceNow

The Proven Path to Take Command of Risk
sponsored by RSA
VIDEO: Some risk management processes today include, outdated reporting, information silos, and limited risk visibility, etc. which can actually lead to more risk in the business. That's why many organizations could benefit from switching to an integrated risk management strategy. Download this video to learn more.
Posted: 19 Mar 2019 | Premiered: 19 Mar 2019

RSA

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: Financial institutions have long been leaders in information security, spending a significant amount of their IT budgets on safeguarding their companies. While they have always been working on reducing threats, new challenges continue to emerge. In this white paper, learn about some of the new challenges financial institutions are facing.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

ServiceNow

LogRhythm SOMM White Paper 2019
sponsored by LogRhythm, Inc.
WHITE PAPER: The traditional approach to the cybersecurity challenge has been prevention-centric. While this approach is necessary, organizations are increasingly shifting their focus to strategies centered on rapid threat detection and response. In this white paper, learn how LogRhythm can help organizations assess and improve their security operations.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

LogRhythm, Inc.

2019 Report: State of the Phish
sponsored by Proofpoint
RESEARCH CONTENT: Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Proofpoint

NIST Cybersecurity Framework
sponsored by One Identity
WHITE PAPER: This white paper provides an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Data Protection by the Numbers
sponsored by Veeam Software
EBOOK: It is critical for companies to gain an understanding of and a formulaic approach to quantifying technical recovery capabilities, business impacts, and financial concerns related to data protection. In this eBook, learn about the 3 different "languages" of data protection.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Veeam Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement