Information Systems Security Business Impact AnalysisWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Systems Security Business Impact Analysis returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Enterprise Information Integration/ Metadata Management
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Endpoint Security
 •   Business Intelligence Solutions
 •   Data Warehousing

Related Searches
 •   Configuration Information Systems
 •   Information Collection
 •   Information Manager
 •   Information Systems Device
 •   Information Systems Mississippi
 •   Information Systems Repair
 •   Information Systems Time
 •   Processing Information Systems Security
 •   Sql Information Systems Security
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Enterprise Information Protection - The Impact of Big Data by IBM

March 31, 2013 - (Free Research)
In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized. 
(WHITE PAPER) READ ABSTRACT |

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint by IBM

December 31, 2008 - (Free Research)
This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns? 
(WHITE PAPER) READ ABSTRACT |

WAN Speak Musings – Volume III by ComputerWeekly.com

November 01, 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Targeted attacks and how to defend against them by ComputerWeekly.com

August 16, 2013 - (Free Research)
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. 
(ANALYST REPORT) READ ABSTRACT |

Threat Analysis: Understanding and Combating DDoS Attacks by SecureWorks

May 31, 2011 - (Free Research)
This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations. 
(WHITE PAPER) READ ABSTRACT |

Business Value Analysis Study: Citizens Business Bank by Symantec Corporation

March 2009 - (Free Research)
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found. 
(WHITE PAPER) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

Oracle Procurement and Spend Analytics by Oracle Corporation

December 2011 - (Free Research)
Through complete end-to-end insight into the factors that impact company performance, you can significantly reduce costs, enhance profitability, increase customer satisfaction and gain competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

Advanced cyber-security intelligence by ComputerWeekly.com

July 2012 - (Free Research)
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. 
(ANALYST REPORT) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

The Web Hacking Incidents Database 2009 Bi-Annual Report by Breach Security

August 2009 - (Free Research)
Criminals focus on exploiting web application vulnerabilities in order to plant malware and thus infect clients who visit websites. Read this report to learn more about the drivers behind web hacking, the vulnerabilities hackers exploit, and the types of organizations attacked most often. 
(WHITE PAPER) READ ABSTRACT |

Outsourcing the problem of software security by ComputerWeekly.com

July 2012 - (Free Research)
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. 
(ANALYST REPORT) READ ABSTRACT |

Printing: a false sense of security? by ComputerWeekly.com

August 2013 - (Free Research)
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. 
(ANALYST REPORT) READ ABSTRACT |

Effective print security for SMBs by ComputerWeekly.com

April 2013 - (Free Research)
Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security. 
(ANALYST REPORT) READ ABSTRACT |

WAN Speak Musings – Volume II by ComputerWeekly.com

July 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

Web Threats: Challenges and Solutions by Trend Micro, Inc.

January 2009 - (Free Research)
Read this white paper to better understand Web threats and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity. 
(WHITE PAPER) READ ABSTRACT |

How to tackle trust management: Impact sensitivity categorisation by ComputerWeekly.com

November 2010 - (Free Research)
Information must be classified using an appropriate Classification Scheme as defined in the Jericho Forum’s Information Classification2 position paper. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012 by Symantec Corporation

June 2012 - (Free Research)
In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Reducing IT TCO with Effective Endpoint Security Management by Lumension

August 2009 - (Free Research)
This audiocast includes the findings from Aberdeen Group's latest report "Endpoint Security, Endpoint Management: The Cost Cutter's Case for Convergence", information about which endpoint security management technologies are used by "Best-in-Class" organizations, and recommendations to improve your security and ultimately reduce IT TCO. 
(PODCAST) READ ABSTRACT |

Effective print management by ComputerWeekly.com

April 2013 - (Free Research)
Analysts Louella Fernandes and Clive Longbottom offer tips on developing an effective print management strategy. 
(ANALYST REPORT) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk by Symantec Corporation

July 2008 - (Free Research)
This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance. 
(BOOK) READ ABSTRACT |

Data Growth Challenges Demand Proactive Data Management by IBM

March 2010 - (Free Research)
Data growth is one of the most significant challenges – and opportunities - facing organizations today. Those that learn to leverage the explosion of important new information sources can gain dramatic competitive advantage as others lag. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts