Companies Risk Management ExampleWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Companies Risk Management Example returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Security Policies
 •   Security Monitoring
 •   Treasury / Cash / Risk Management
 •   Network Security
 •   Business Process Management (BPM)
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Companies Make
 •   Companies Practice
 •   Companies Risk Management Procurement
 •   Companies Tutorials
 •   Content Companies Risk Management
 •   Employee Companies Risk
 •   Guide Companies
 •   List Companies Risk
 •   Policy Companies Risk Management
 •   Summary Companies
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 23, 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

The Five Keys to Organic Growth: How to Drive Profitable Relationships with Predictive Analytics by SPSS Inc. Worldwide Headquarters

February 20, 2009 - (Free Research)
This paper makes the case for using predictive analytics to drive organic growth, and gives two different methods for measuring financial return. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Virtualization E-book, Chapter 6: How Virtual Infrastructures Change Security by SearchServerVirtualization

October 26, 2009 - (Free Research)
Protecting the virtual data center doesn't need to be any more difficult than protecting a physical network. The key is to remain vigilant. In this chapter, you'll learn how to mitigate potential security risks to your resource pool and virtual machines without over-allocating administration. 
(EBOOK) READ ABSTRACT |

Hard Hat Area: Myths and Pitfalls of Data Mining by SPSS Inc. Worldwide Headquarters

February 20, 2009 - (Free Research)
The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners. 
(WHITE PAPER) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 30, 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

Three Mistakes Companies Make When It Comes to Vulnerability Management by Core Security Technologies

October 07, 2013 - (Free Research)
In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks. 
(WHITE PAPER) READ ABSTRACT |

Thawte in Education by Thawte Inc.

September 30, 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

How Can You Avoid a Web Security Breach? It's All in the Preparation by Thawte Inc.

November 14, 2013 - (Free Research)
In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches. 
(EGUIDE) READ ABSTRACT |

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation by Thawte Inc.

January 29, 2014 - (Free Research)
In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections. 
(EGUIDE) READ ABSTRACT |

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today by SSH Communications Security Corp.

May 21, 2012 - (Free Research)
While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them. 
(WHITE PAPER) READ ABSTRACT |

Profitable Innovation:  Medical Device Business Model for Growth by Sage North America

December 09, 2010 - (Free Research)
This Sage ERP Accpac white paper focuses on innovations in the medical device field and how these innovative solutions affect the bottom line. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Proven, defensible eDiscovery for the Enterprise: Reduce Cost and Risk by StoredIQ

March 16, 2009 - (Free Research)
This data sheet provides several real world examples on how companies have reduced costs and risks by implementing proven, defensible eDiscovery for their Enterprises. 
(WHITE PAPER) READ ABSTRACT |

Making the Case for BPM: A Benefits Checklist by IBM

December 15, 2010 - (Free Research)
BPM is the best investment a company can make in establishing a platform for continuous improvement. The challenge for many companies is justifying the BPM investment instead of traditional paths for solving process problems – like buying an application or building a custom application. This paper provides a virtual checklist for the benefits. 
(WHITE PAPER) READ ABSTRACT |

Maximizing Value from SAP with Supply Chain Collaboration in Software as a Service Model by E2open

May 2007 - (Free Research)
This white paper highlights some of the risks and challenges associated with establishing collaborative, shared supply chain processes across all trading partners. 
(WHITE PAPER) READ ABSTRACT |

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content by Dell Software

December 2011 - (Free Research)
This essential cost-benefit analysis illustrates through several use cases and examples how businesses can benefit from properly archiving electronic content and email. Discover how much time, money and energy your company should expect to save from implementing sound retention policies and capabilities. 
(WHITE PAPER) READ ABSTRACT |

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security by Tripwire, Inc.

February 2011 - (Free Research)
Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches. 
(WHITE PAPER) READ ABSTRACT |

Working Together To Improve Strategic Planning by Oracle Corporation

October 2010 - (Free Research)
This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning. 
(WHITE PAPER) READ ABSTRACT |

Working Together To Improve Strategic Planning by Oracle Corporation

December 2009 - (Free Research)
Read this paper for compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning. 
(WHITE PAPER) READ ABSTRACT |

Business Continuity Planning IT Survival Guide by CA Technologies.

December 2008 - (Free Research)
This survival guide will help you and your company start to plan an effective business continuity plan. The end result should be a reduction in risk factors and to minimize the impact of disasters that are out of your control. 
(WHITE PAPER) READ ABSTRACT |

How to manage emerging technology in IT by ComputerWeekly.com

February 2011 - (Free Research)
Different Emerging Information Technologies (EIT) have different impacts upon a business. Some EIT should be used as technical tools for supporting business to make business more efficient or effective; othersshould be used as strategic tools for leading, not merely supporting, a business to make a difference. 
(WHITE PAPER) READ ABSTRACT |

Understanding the Value of Cloud Solutions: Maximize Your ROI by HP & Intel®

December 2012 - (Free Research)
This paper provides examples of the return on investment (ROI) of an HP Cloud Service Automation solution. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight by Core Security Technologies

October 2013 - (Free Research)
This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts