Control Risk Assessment FunctionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Control Risk Assessment Functions returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Vulnerability Assessment
 •   Treasury / Cash / Risk Management
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Security Policies
 •   Business Process Management (BPM)
 •   Security Monitoring
 •   Access Control

Related Searches
 •   About Control Risk
 •   Control Mapping
 •   Control Risk Assessment Integrated
 •   Control Risk Assessment Reseller
 •   Control Risk Assessment Sheet
 •   Control Risk Impact
 •   Control Risk System
 •   Controls Control Risk
 •   Portal Control
 •   Techniques Control Risk Assessment
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Controlling Risk Through Software Code Governance by Coverity

July 26, 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Controlling Risk: Quality Management for SAP® Implementations and Upgrades by Hewlett-Packard Company

November 2008 - (Free Research)
This paper summarizes the benefits of using HP software throughout the SAP application lifecycle, while focusing primarily on ensuring a smooth implementation, upgrade and go live with SAP applications. 
(WHITE PAPER) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by FrontRange Solutions Inc

July 2008 - (Free Research)
Software Asset Management (SAM) can deliver increased efficiency, better cost control, risk mitigation and patch management. This paper provides an overview of SAM benefits, and addresses the specific issues in getting SAM running in your company. 
(WHITE PAPER) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by Centennial-Software

July 2008 - (Free Research)
This white paper provides a general overview of SAM benefits, and then addresses the specific issues involved in getting SAM up and running in your organization. 
(WHITE PAPER) READ ABSTRACT |

IBM Information Management: Manage your data and control risk to develop information you can trust by IBM

November 2011 - (Free Research)
The IBM Information Management portfolio offers a complete set of solutions designed to help you not only manage your data, but also master it. Read on to learn more about: Data management, information integration, data warehousing and more. 
(WHITE PAPER) READ ABSTRACT |

Yes You Can Connect Employees' Personal Smartphones by BlackBerry

September 2011 - (Free Research)
Employees are flooding IT departments with requests to connect their personal smartphones to the company IT infrastructure. Disregarding the real productivity benefits from connected employees, until now many IT departments have been too concerned with security and control risks. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

SingTel Selects Alcatel-Lucent as Strategic Partner in IPTV Deployment by Alcatel-Lucent

June 2009 - (Free Research)
Read this case study to learn how SingTel, a major carrier in the Asia-Pacific region, overcame the challenges associated with providing new services and broadening their customer base. The solution allowed them to provide advanced IPTV features - including HD VoD - quickly and at aggressive prices, thereby affirming their place as a market leader. 
(CASE STUDY) READ ABSTRACT |

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value by Accenture

June 2008 - (Free Research)
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems. 
(WEBCAST) READ ABSTRACT |

Governance and control: Focus risk management on multiple levers of control by IBM

April 2009 - (Free Research)
Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior. 
(WHITE PAPER) READ ABSTRACT |

The Global CFO Study 2008 by IBM Line of Business

October 2007 - (Free Research)
This study, conducted in cooperation with Wharton Business School and the Economist Intelligence Unit, explores how CFOs can help balance risk and performance in a rapidly changing business climate. 
(WHITE PAPER)

Data Center Evolution Without Revolution by Brocade

June 2010 - (Free Research)
While many companies understand the benefits of virtualization and cloud computing, they struggle to prepare their data center for such a transition. Discover how to avoid a “rip-and-replace” approach by utilizing a phased network architecture upgrade that helps control risk and costs. 
(WHITE PAPER) READ ABSTRACT |

Total Economic Impact of Oracle Identity Manager by Oracle Corporation

November 2008 - (Free Research)
Oracle Identity Manager is an enterprise identity management system that manages users' access right and privileges, throughout the provisioning life-cycle, within enterprise IT resources. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Management Security Live Chat Transcript by SailPoint Technologies

May 2013 - (Free Research)
In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Barclays Bank by Lumension

August 2008 - (Free Research)
Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices. 
(CASE STUDY) READ ABSTRACT |

Forrester Report: The Total Economic Impact of Oracle Identity Manager by Oracle Corporation

November 2008 - (Free Research)
This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results. 
(ANALYST REPORT) READ ABSTRACT |

Choosing a Cloud Provider with Confidence by GeoTrust, Inc.

July 2011 - (Free Research)
In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business. 
(WHITE PAPER) READ ABSTRACT |

Taking a Strategic Approach to Risk Management by TraceSecurity

December 2012 - (Free Research)
This e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more. 
(EGUIDE) READ ABSTRACT |

Best Practices in Creating a Strategic Finance Function by SAP America, Inc.

January 2009 - (Free Research)
the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices. 
(WHITE PAPER) READ ABSTRACT |

The Ties That Bind by SearchCIO.com

February 2014 - (Free Research)
Enterprise compliance and security departments should work together to achieve business goals. Find out how this tandem can battle the regulatory and IT threat landscape. 
(EGUIDE) READ ABSTRACT |

Information security for SMEs by ComputerWeekly.com

May 2014 - (Free Research)
In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Control Compliance Suite Trialware by Symantec Corporation

April 2009 - (Free Research)
Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial. 
(DOWNLOAD)

Multiplying MES Value with PLM Integration by Apriso Corporation

August 2008 - (Free Research)
MES platforms have, and continue to provide, significant opportunities to integrate manufacturing functions while reducing wasted time, energy, and material on the factory floor. 
(WHITE PAPER) READ ABSTRACT |

IBM PureSystems: A family of expert integrated systems by IBM

October 2012 - (Free Research)
This resource offers advice to help you make the shift to smarter computing by embracing expert integrated systems, allowing your organization to reduce IT inefficiencies, control risks and costs, streamline management, and more. 
(WHITE PAPER) READ ABSTRACT |

Mobile NAC: Protecting Network Security by Protecting Mobile Endpoints by Fiberlink Communications

June 2008 - (Free Research)
This white paper discusses a new approach to Network Access Control that overcomes both of these shortcomings of conventional NAC products. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts