Business of Information Technology  >   Business Management  >  

Risk Management

RSS Feed   
ALSO CALLED: Managing Risk, Enterprise Risk Management, Loss Management, Business Risk Analysis, IT Risk Management
DEFINITION: Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimizethe effects of risk on an organization's capital and earnings. Enterprise risk management expands the process to include not just risks associated with accidental losses, but also financial, strategic, operational, and other risks.In recent years, external  … 

Risk Management definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Risk Management Reports
26 - 50 of 1647 Matches Previous Page  |  Next Page
The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER: In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

The Rise of Machine Learning in Cybersecurity
sponsored by CrowdStrike
WHITE PAPER: Today, the latest trend in cybersecurity is artificial intelligence, and specifically machine learning (ML). In this 31-page e-book, gain a detailed definition of ML and how you can successfully apply it to your security initiatives like malware detection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

CrowdStrike

Getting Started With Attribute Based Access Control
sponsored by Axiomatics
WHITE PAPER: How are you protecting access to your most critical assets? Explore this white paper to gain insight into attribute based access control (ABAC) and uncover 3 major steps to deploying an effective program.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Protect High-Value Assets From Internal Security Risks
sponsored by Hewlett Packard Enterprise
RESOURCE: Access this resource to discover how your organization can gain back network security confidence regarding high-value assets and corporate data with user and entity behavior analytics.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Hewlett Packard Enterprise

IAM for the Real World: Access Management
sponsored by One Identity
WHITE PAPER: A large government agency with 250,000 users across its Windows and Unix/Linux environments found that each individual IT-assisted access management activity cost more than $300. Annually, this cost is staggering. Access this white paper to learn how to advance your access management approach with real-world examples from organizations.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

Future-Proof Your Tactical IAM Projects
sponsored by One Identity
EBOOK: This e-book provides insight into how to overcome barriers to identity and access management (IAM) success by future-proofing your tactical IAM projects.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

2018 Gambling Security Report
sponsored by iovation, Inc.
RESOURCE: 2017 marked the first year in which iOS had the largest share of gambling transactions. With the online gaming market booming, cybercriminals are finding ways to target personal data. Utilize this guide to learn how to prepare for unconventional attacks, prevent fraud, and adhere to regulations within the online gaming industry.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

iovation, Inc.

Strategies for Successfully Managing Privileged Accounts
sponsored by One Identity
WHITE PAPER: One of the most important aspects of an IAM program is the securing, management and governance of privileged accounts. This resource uncovers strategies for successfully managing privileged accounts in order to improve your IAM approach.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

Web Application Firewall
sponsored by NSS Labs
RESOURCE: The web application firewall market is projected to grow to over $650M in 2019, according to NSS Labs. This resource offers an overview of protecting networks and web applications by utilizing web applications firewalls.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

NSS Labs

Holistic Endpoint Security
sponsored by Cylance
RESOURCE: According to Forrester, as cyber threats are increasing in number and complexity, traditional approaches to endpoint security have become outdated and less effective. This Forrester study offers a market overview of endpoint security and provides key trends within the industry as well as examples of strategies organizations are taking.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Cylance

Top 5 Ways to Relieve the Pain of Managing Hybrid AD Environments
sponsored by One Identity
WHITE PAPER: According to One Identity, nearly 90% of organizations worldwide are using Active Directory (AD) for on-premises resources. This e-book addresses 5 challenges that organizations must overcome as they navigate the transition to a hybrid AD implementation.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Why SOX Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: For many organizations, compliance with data security standards doesn't seem to be getting easier. This resource addresses IT security compliance challenges and provides recommendations in regard to the Sarbanes-Oxley Act (SOX).
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

AV Replacement Guide
sponsored by CrowdStrike
RESOURCE: This guide is designed to help security professionals who are considering replacing their current antivirus and/or endpoint protection programs.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

CrowdStrike

IAM for the Real World: Privileged Account Management
sponsored by One Identity
EBOOK: The world of IAM is one of constant change, shrinking deadlines and harsh regulations. This e-book dives into the most pressing IAM issues faced by organizations and offers actionable, affordable and sustainable approaches to combatting these challenges.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
ANALYST REPORT: In this 32-page Ponemon Institute report, learn how organizations are deploying security technologies that augment or replace human intervention, along with the benefits of automation and their cost effectiveness.
Posted: 12 Feb 2018 | Published: 30 Nov 2017

Juniper Networks

Cyber Threat Protection Platform
sponsored by NSS Labs
RESOURCE: Enterprise defenses are constantly being challenged by attackers who are morphing tactics and adopting new evasion techniques at a record pace. This resource offers strategies for continuous security validation and cyber risk protection.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

NSS Labs

System Risk Identification
sponsored by NSS Labs
RESOURCE: Organization attack surfaces are large and complex, making it impossible to protect against everything all of the time. This resource offers strategies for assessing the impact of unmitigated risks and how to focus on the real attack surface.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

NSS Labs

Case Study: Ensure Growth with High-Performance, Intelligent Network Security
sponsored by Juniper Networks
CASE STUDY: This case study discusses how Hyland, a developer of enterprise software solutions, built a secure network that not only simplified and automated their security policy but improved network performance and reliability.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Juniper Networks

Top 5 Questions to Ask Before Purchasing a Two-Factor Authentication Solution
sponsored by One Identity
RESOURCE: With the multitude of two-factor authentication programs available in the market today, how do you know which one is right for your organization? This resource offers 5 questions to ask before selecting and implementing a two-factor authentication strategy.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

Security Control Effectiveness
sponsored by NSS Labs
RESOURCE: According to NSS Labs survey of CISOs in North America, 52% of enterprises see no "value-add" from their currently deployed security products. This resource offers an approach to security control effectiveness and will assist you in evaluating the performance of security defenses as well as reveal unmitigated risks.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

NSS Labs

Real-Time Threat Prevention lets Managed IT Services Provider Vology Thrive
sponsored by Juniper Networks
CASE STUDY: An IT consulting company, Vology sought to protect corporate headquarters and branch offices from advanced threats in email messages and websites. In this case study, discover how Vology turned to an advanced threat protection tool that constantly analyzes email and web files to detect advanced persistent threats
Posted: 12 Feb 2018 | Published: 31 May 2017

Juniper Networks

10 Steps to Cleaning up Active Directory User Accounts
sponsored by One Identity
WHITE PAPER: Active Directory (AD) is the foundation of IAM at most organizations and as a result, is one of the most crucial technologies on the network. This resource offers 10 steps to remediate user account problems in AD and to prevent them from occurring in the future.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WHITE PAPER: Access this SANS review to learn about the key benefits of deception technology and how to successfully deploy it in your network security strategy.
Posted: 12 Feb 2018 | Published: 31 May 2017

Illusive Networks

2018 Data Governance Implementation Survey
sponsored by Red Gate Software
RESEARCH CONTENT: 77% of respondents have either already implemented a data governance program or plan to within the next two years, according to the 2018 Data Governance Implementation Survey. This resource reveals notable components of the 2018 Data Governance Implementation Survey, including insights on the GDPR.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Red Gate Software

The 5 News Headlines You Don't Want to Be About Your Organization
sponsored by Juniper Networks
RESOURCE: 1/4 of major organizations experience at least one network breach each month, according to The Cyber Security Breaches Survey. This resource provides 5 security worse case scenarios and advice on how to prevent your organization from appearing in cyberattack news headlines.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Juniper Networks
26 - 50 of 1647 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement