Gartner View Of RisksWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Gartner View Of Risks returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Center Management
 •   Wireless Technologies and Mobile Computing
 •   Social Networks and Community Management
 •   Data Security
 •   Customer Relationship Management (CRM)
 •   Business to Consumer Web Commerce
 •   Mobile Device Management
 •   Treasury / Cash / Risk Management
 •   Customer Data Integration

Related Searches
 •   Examples Gartner View Of
 •   Gartner Designs
 •   Gartner Maintain
 •   Gartner North Dakota
 •   Gartner Statements
 •   Gartner View Of Info
 •   Gartner View Of Webcasts
 •   Need Gartner View Of
 •   Objectives Gartner View
 •   Starting Gartner View Of
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Strengthening Governance, Risk, and Compliance in the Banking Industry by SAP America, Inc.

January 05, 2011 - (Free Research)
Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. Read this report to learn more. (Economist Intelligence Unit, 2009) 
(ANALYST REPORT) READ ABSTRACT |

Key Challenges in Risk Management: How Immediate Access to Integrated Information Can Mitigate Risk by Sybase, an SAP company

April 30, 2012 - (Free Research)
<p>This white paper reveals the findings of a recent survey of senior risk and IT decision-makers in international financial institutions, exploring their current risk management capabilities and their plans for introducing integrated technologies, and examining the relationship between data management and risk mitigation in depth.</p> 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Value with Oracle Governance, Risk & Compliance by Oracle Corporation

October 01, 2010 - (Free Research)
In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence for Government Agencies by IBM

March 31, 2013 - (Free Research)
This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence for Government Agencies by IBM

March 31, 2013 - (Free Research)
This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems. 
(WHITE PAPER) READ ABSTRACT |

Control Compliance Suite Trialware by Symantec Corporation

April 01, 2009 - (Free Research)
Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial. 
(DOWNLOAD)

Computer Weekly - 7 February 2012: IT investment priorities by ComputerWeekly.com

February 07, 2012 - (Free Research)
In this week’s Computer Weekly, we examine exclusive research into the investment priorities of UK IT decision-makers, which shows virtualisation, Windows 7 and security as the top areas for spending this year. We analyse the changing nature of database architecture; and the BBC’s Chief Technology Officer talks about IT plans for the broadcaster. 
(EZINE) READ ABSTRACT |

Gartner: CIO checklist for next-generation mobile strategies by ComputerWeekly.com

July 31, 2012 - (Free Research)
This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Best practices for I&O for cloud-readiness by ComputerWeekly.com

January 14, 2013 - (Free Research)
Gartner analysts explain how Infrastructure and Operations (I&O) teams can best prepare for the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Best Practices for Managing the Increasing Depth of Compliance Regulation by IBM

May 18, 2011 - (Free Research)
According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations. 
(EGUIDE) READ ABSTRACT |

The Future of Authentication for Online Services by SafeNet, Inc.

November 02, 2009 - (Free Research)
In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks. 
(WHITE PAPER) READ ABSTRACT |

Taking the Pain out of Data Protection, Recovery and Restore by Zetta Inc.

September 07, 2010 - (Free Research)
Ninety five percent of organizations that failed to recover their data and systems within two weeks of a disaster go out of business within two years. This is not a pretty picture. Regrettably, the consequences of poor DR preparedness will only come to light when there is a disaster. There has to be a better way. There is.  
(WHITE PAPER) READ ABSTRACT |

Gartner research report on Cloud Services Brokerages by Intel

September 26, 2011 - (Free Research)
A cloud services brokerage (CSB) is a type of service provider that plays an intermediary role in cloud computing. This research defines CSBs and outlines the capabilities that are needed to successfully intermediate cloud services. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Expert guide to server virtualization by CA Technologies.

July 27, 2010 - (Free Research)
This expert e-guide on virtual security reveals four key points you must keep in mind to ease security integration as your virtualization project comes together. In addition, Gartner explains the six most common server virtualization security risks, along with advice on how to address each issue. 
(EGUIDE) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 13, 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

February 10, 2009 - (Free Research)
Application security has risen to the top of the agenda for security professionals striving to control their overall risk profile. According to US Computer Emergency Response Team (US-CERT) and Gartner, 75% of new attacks target the application layer and software vulnerabilities have reached... 
(WHITE PAPER) READ ABSTRACT |

Gartner Magic Quadrant for WAN Optimization 2013 by Riverbed Technology, Inc.

April 29, 2013 - (Free Research)
Riverbed is positioned in the Leaders Quadrant of the 2013 Gartner Magic Quadrant for WAN Optimization Controllers. In this report, Gartner evaluates vendors based on their ability to execute and completeness of vision. 
(ANALYST REPORT) READ ABSTRACT |

Top 10 BYOD Pitfalls to Avoid by SearchSecurity.com

July 08, 2013 - (Free Research)
This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology. 
(EGUIDE) READ ABSTRACT |

The Data Center Dilemma: Controlling Costs While Managing Risk by Emerson Network Power

July 30, 2010 - (Free Research)
The escalation in data center costs has been driven by the demand for computing. IT has responded to this demand by adding more servers and replacing older servers with newer devices that deliver more power in less space. Read this whitepaper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 24 January 2012: Has Microsoft succeeded with Trustworthy Computing? by ComputerWeekly.com

January 24, 2012 - (Free Research)
In this week’s Computer Weekly, we mark the 10th anniversary of Microsoft’s Bill Gates announcing the Trustworthy Computing initiative, and ask if it has made IT more secure. We look at what Oracle’s latest developments mean for its software users running rivals’ servers, and conclude our Buyer’s Guide to IT consumerisation. Download the issue now. 
(EZINE) READ ABSTRACT |

Magic Quadrant for Cloud-Based IT Project and Portfolio Management Services by Innotas

May 13, 2013 - (Free Research)
Cloud-based IT project and portfolio management (PPM) software is gaining popularity, but with all the vendor hype and so many options, choosing the right one can be difficult. In this in-depth Gartner report, explore why so many organizations are turning to cloud-based PPM, and compare the strengths and weaknesses of popular software vendors. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for WAN Optimization by Riverbed Technology, Inc.

March 27, 2014 - (Free Research)
For the 7th year in a row, Riverbed is in the "Leaders" Quadrant of the 2014 Magic Quadrant for WAN Optimization Controllers. In this report, Gartner evaluates vendors based on their ability to execute and completeness of vision. 
(ANALYST REPORT) READ ABSTRACT |

DataFlux Positioned in Leaders Quadrant of the 2010 Magic Quadrant for Data Quality Tools by DataFlux Corporation

July 29, 2010 - (Free Research)
DataFlux was recently positioned by Gartner, Inc. in the Leaders Quadrant of its 2010 “Magic Quadrant for Data Quality Tools” report. Gartner’s Magic Quadrants evaluate vendors within a particular technology market based on their completeness of vision and ability to execute. Use this Magic Quadrant to understand the data quality tools market. 
(ANALYST REPORT) READ ABSTRACT |

Gartner: How to build an online community by ComputerWeekly.com

February 14, 2014 - (Free Research)
Gartner analyst Julie Hopkins explains seven ways to lure people to participate in online communities and shows how to choose the tactics that will best suit your business needs. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Time to rethink backup procedures by ComputerWeekly.com

February 04, 2014 - (Free Research)
IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures, says Gartner analyst Dave Russell. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts