Make RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Make Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Treasury / Cash / Risk Management
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Network Security
 •   Managed Security Services

Related Searches
 •   Make Asp
 •   Make Faq
 •   Make Payment
 •   Make Risk Decision
 •   Make Risk Tool
 •   Make Risk Video
 •   Make Server
 •   Practice Make Risk
 •   Usa Make Risk
Advertisement

ALL RESULTS
1 - 25 of 450 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Disaster Recovery 101: Assessing Risk & Preventing Human-made Disasters by QuorumLabs

December 29, 2011 - (Free Research)
This SearchDisasterRecovery.com E-Guide will provide you with the necessary steps for evaluating risk in you DR plan, and offer insight into the high-level threats you need to watch out for today. Read on for a deep dive into the risk evaluation process, information on preventing human-made disasters and more. 
(EGUIDE) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 25, 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

SIEM and DLP Together: A More Intelligent Information Risk Management Strategy by RSA, The Security Division of EMC

December 17, 2009 - (Free Research)
This paper explores examples of how DLP and SIEM together can make for more intelligent information risk management. 
(WHITE PAPER) READ ABSTRACT |

Making Mobility Matter in Healthcare Data Security by Dell, Inc.

June 18, 2012 - (Free Research)
This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place. 
(WHITE PAPER)

Reducing risk through requirements-driven quality management: An end-to-end approach by Hewlett-Packard Company

February 2008 - (Free Research)
When IT initiates a project, the department makes a commitment to the business to ensure quality and success when it is deployed. Learn how requirements management helps IT quantify project risks and make informed decisions about resource allocation. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: The Top Four Business Risks of Social Media by BlueCoat

September 2011 - (Free Research)
Social networks are changing the way people interact, communicate, form opinions, and purchase. And businesses must support social media to drive their business. However, this medium can also pose new security risks. View now to explore the top four risks of social networking and discover various ways to protect against and mitigate these risks. 
(WHITE PAPER) READ ABSTRACT |

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World by CommVault Systems, Inc.

October 2013 - (Free Research)
This white paper uncovers the various aspects of governance, risk, and compliance (GRC), and offers key advice on how to build a platform that will help organizations improve overall operations. 
(WHITE PAPER) READ ABSTRACT |

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication by RSA, The Security Division of EMC

August 2010 - (Free Research)
In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security. 
(WHITE PAPER) READ ABSTRACT |

Is Time to Market King? by IBM

November 2011 - (Free Research)
The common thread of successful software development is enabling collaboration in context - making the process transparent so stakeholders remain informed and empowered to contribute. Once this thread is established, technology can be implemented that provides the glue for stakeholders to collaborate and meet their time to market or goals. 
(WHITE PAPER) READ ABSTRACT |

Smart  Organisations by ComputerWeekly.com

October 2011 - (Free Research)
Download this report to learn how your organisation can use smart technology to drive innovation and enhance your competitive position, without breaking the bank. 
(WHITE PAPER) READ ABSTRACT |

Making the Case for BPM: A Benefits Checklist by IBM

December 2010 - (Free Research)
BPM is the best investment a company can make in establishing a platform for continuous improvement. The challenge for many companies is justifying the BPM investment instead of traditional paths for solving process problems – like buying an application or building a custom application. This paper provides a virtual checklist for the benefits. 
(WHITE PAPER) READ ABSTRACT |

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World by CommVault Systems, Inc.

April 2014 - (Free Research)
This white paper explains how a GRC platform can transform how an organization operates – internally, externally and legally. It explains how a suitable platform enables better, faster decision making, creating a more competitive organization. 
(WHITE PAPER) READ ABSTRACT |

Dealing with Governance, Risk & Compliance in an Info-Centric World by CommVault Systems, Inc.

October 2013 - (Free Research)
View this comprehensive report from Quocirca Research on how to manage multiple aspects of governance, risk, and compliance (GRC), and learn why a comprehensive GRC platform -- as opposed to a combination of different tools -- can help you effectively manage your organization's information assets. 
(WHITE PAPER) READ ABSTRACT |

How BI Technology is Improving Risk Management by IBM

January 2014 - (Free Research)
Access the following case study to reveal how Argos Risk used a business intelligence and analytics solution to help distinguish and alleviate risk. Not only that, discover how they also were able to drive higher business value with their data and what you can do to achieve similar results. 
(CASE STUDY) READ ABSTRACT |

Hyper-V Virtual Labs Tips and Tricks by Veeam Software

April 2014 - (Free Research)
Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: March 2009 - Sky-High Risk? by Information Security Magazine

March 2009 - (Free Research)
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more. 
(EZINE)

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

Understanding and Managing Supply Chain Risk by SAP America, Inc.

January 2006 - (Free Research)
Download this white paper and explore new thinking on potential risk to global supply chains and how companies are adopting the statistical methods more commonly associated with finance and insurance. Learn how identifying and profiling risk variables, quantifying risk and using IT solutions can create higher resilience for supply chain management. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: Protect and Maximize Stakeholder Value by Oracle Corporation UK Ltd

February 2009 - (Free Research)
This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management - Methods and tools by SearchSecurity.com & SearchCompliance.com

May 2009 - (Free Research)
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business. 
(EBOOK) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

Understanding the risks of mobile apps by Veracode, Inc.

May 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

The Mobile App Top 10 Risks by Veracode, Inc.

February 2011 - (Free Research)
This expert webcast reveals the top 10 mobile application risks facing organizations today. 
(WEBCAST) READ ABSTRACT |

Handle with Care: Calculating and managing risk is tricky business by SearchSecurity.co.UK

March 2011 - (Free Research)
In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape. 
(EZINE)

1 - 25 of 450 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts