Information On AssessmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information On Assessment returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Vulnerability Assessment
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Business Process Management (BPM)
 •   Business Planning
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Managed Security Services

Related Searches
 •   Devices Information On
 •   Information On Assessment Workflow
 •   Information On Impact
 •   Information On Imports
 •   Information Operating
 •   Planning Information On Assessment
 •   Purchasing Information On Assessment
 •   Records Information On
 •   Screen Information On Assessment
 •   Timeline Information
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Information security for SMEs by ComputerWeekly.com

May 23, 2014 - (Free Research)
In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs. 
(ESSENTIAL GUIDE) READ ABSTRACT |

SearchSecurity.com E-Guide: Balancing compliance with information security threat assessment by IBM

September 20, 2011 - (Free Research)
While compliance regulations and standards have improved information security, they have also created unique challenges when it comes to adequately securing the organization. This expert tip offers authoritative, technical advice on how to balance compliance with your information security threat assessment. 
(EGUIDE) READ ABSTRACT |

Configuration Assessment: Choosing the Right Solution by Tripwire, Inc.

July 2008 - (Free Research)
Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits. 
(WHITE PAPER) READ ABSTRACT |

Information Agenda Assessment Tool by IBM

October 2009 - (Free Research)
The cost and complexity of managing increasing volumes of data and content, plus the need to provide trusted information to all users, are driving CIOs to rethink approach to information delivery. This quick self-assessment is the first step to find out how IBM's Info Agenda approach can help your company unlock the business value of information. 
(ASSESSMENT TOOL)

Risk Assessment: A Vital Step in Developing a Best Practice Program by Iron Mountain

May 2011 - (Free Research)
The increasing regulatory demands surrounding the protection of personally identifiable information is placing more importance on your offsite tape program. Although sound disaster and data recovery plans are essential, the future will require visibility and auditability across your entire tape program. 
(DATA SHEET) READ ABSTRACT |

A Tour of HP Sarbanes-Oxley IT Assessment by Hewlett-Packard Company

April 2009 - (Free Research)
This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans. 
(WHITE PAPER) READ ABSTRACT |

Information Agenda Assessment Tool by IBM India Pvt. Ltd

December 2010 - (Free Research)
An information agenda can help transform information into a strategic asset to improve business outcomes. This quick self-assessment is the first step to find out how IBM's Information Agenda approach can help your company unlock the business value of information. 
(ASSESSMENT TOOL) READ ABSTRACT |

ERP Assessment and Selection: Get It Right the First Time by Panorama Consulting Group

September 2009 - (Free Research)
Read this white paper for several great tips for selecting the right ERP vendor for your organization. This paper breaks the process down into easy-to-follow steps, beginning with the basic questions decision-makers should ask. 
(WHITE PAPER) READ ABSTRACT |

Capacity Management Maturity Assessment by TeamQuest Corporation (E-mail this company)

October 2011 - (Free Research)
Take this capacity management maturity assessment in order to better understand how your company handles performance goals, business forecasting and business process management. Gain advice based on your answers to the assessment questions that will help move your company to higher levels of maturity. 
(ASSESSMENT TOOL) READ ABSTRACT |

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession by Information Security Magazine

February 2009 - (Free Research)
Check out this eBook and get expert advice that can help your company successfully improve its threat management posture. 
(EBOOK) READ ABSTRACT |

Analyze Your IT Infrastructure Now! by Centennial-Software

June 2008 - (Free Research)
Organizations are faced with regulatory, compliance and cost pressures that impact IT departments immensely. Evaluate your organization now to see how you can improve IT to deliver more value! 
(WHITE PAPER) READ ABSTRACT |

Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network by Code Green Networks, Inc.

September 2009 - (Free Research)
Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data. 
(WHITE PAPER) READ ABSTRACT |

How Should an Enterprise Move towards Unified Communications? by Avaya Inc.

June 2008 - (Free Research)
Avaya moves customers toward Unified Communications to support complex and flexible work environments. The consultative process begins with a business assessment to understand the communication patterns, and to see where business processes slow down. 
(WHITE PAPER) READ ABSTRACT |

Workforce and Customer Experience Assessment by IBM

March 2014 - (Free Research)
Access the following resource to take the social business assessment to find out just how "social" you really are. Also uncover how the social business can ultimately create a smarter workforce and exceptional customer experience. 
(ASSESSMENT TOOL) READ ABSTRACT |

Your Enterprise Database Security Strategy (Forrester Consulting Report) by IBM

September 2009 - (Free Research)
Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - April 2010: Endpoints on the Loose by Information Security Magazine

April 2010 - (Free Research)
This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more. 
(EZINE)

Achieving ISO 27001 Compliance using Titus Solutions by TITUS

November 2010 - (Free Research)
This paper provides IT professionals with a high level overview of ISO 27001 and 27002, along with their implications for security of email and digital documents. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Software Internationalization/Translation/Localization Services by Globalization Partners International

Globalization Partners International (GPI) provides Global Translation, Localization (L10N) and Internationalization (I18N) services into over 50 languages helping companies develop global software. 
(SERVICE)

Technology Assessment Vendor Viewpoint: Teradici Corporation by Teradici Corporation

January 2007 - (Free Research)
This white paper gives a IT administrators a new approach to computer deployment management and PC functionality. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security by Trend Micro, Inc.

January 2011 - (Free Research)
An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management. 
(WHITE PAPER) READ ABSTRACT |

6 Mistakes Companies Make and How to Avoid Them by SAP America, Inc.

September 2009 - (Free Research)
This paper highlights common mistakes companies make in a down economy and discusses how organizations can use business intelligence to avoid them. Use the self-assessment questionnaire at the end of this paper to determine the level of business intelligence opportunity across your organization. 
(WHITE PAPER) READ ABSTRACT |

Optimizing Performance and Maximizing Investments in Tape Storage Systems by Fujifilm USA

July 2009 - (Free Research)
Fujifilm Tape Environment Analysis is the first vendor-agnostic, platform-neutral, comprehensive assessment for tape storage systems. It provides an assessment of the backup environment culminating in a report that includes recommendations to maximize existing resources, avoid unnecessary expenditures and ensure compliance requirements are met. 
(WHITE PAPER) READ ABSTRACT |

The Essentials Series: Security Information Management by SecureWorks

October 2009 - (Free Research)
This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts