Measures RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Measures Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Application Security
 •   Network Security
 •   Treasury / Cash / Risk Management
 •   Endpoint Security
 •   Wireless Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Calendar Measures Risk
 •   Integration Measures Risk
 •   Measures Risk Conversions
 •   Measures Risk Diagram
 •   Measures Risk Form
 •   Measures Risk Import
 •   Measures Risk It
 •   Measures Risk West Virginia
 •   Measures Risk White Papers
 •   Portal Measures
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 20, 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 25, 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

Data Risk Management Solutions by IBM Software Group

May 01, 2007 - (Free Research)
This white paper details the benefits of effectively calculating and quantifying risk to data within an organization, highlighting a holistic approach to monitoring, measuring and managing data risk and compliance. 
(WHITE PAPER)

The CISOs Guide to Measuring IT Security by Lumension

January 12, 2012 - (Free Research)
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth by ESET

December 03, 2009 - (Free Research)
The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 05, 2012 - (Free Research)
<p>To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.</p> 
(WHITE PAPER) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 11, 2011 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

 Five tips to reduce risk from modern web threats by Sophos, Inc.

October 06, 2010 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

Reduce the Cost and Complexity of Multi-sourced IT Environments by Hewlett-Packard Company

May 09, 2012 - (Free Research)
Public, private and hybrid cloud services have made it increasingly difficult for IT organizations to govern and manage IT services— at the same time that businesses are demanding greater agility and faster delivery from IT. View this webcast to learn how to rein in this supplier sprawl to improve service quality and reduce costs and risks. 
(WEBCAST) READ ABSTRACT |

E-Guide: Avoiding Application Security Pitfalls by IBM

January 14, 2011 - (Free Research)
This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them. 
(EGUIDE) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

SANS Institute: Oracle Database Security, What to Look for and Where to Secure by Oracle Corporation

June 2010 - (Free Research)
To properly protect the information at the database layer there are a number of comprehensive measures that need to be taken. With this paper Tanya Baccum, SANS Institute analyst, examines these measures for holistically protecting Oracle database from inside out. 
(WHITE PAPER) READ ABSTRACT |

10 Tips to Measure Training ROI by ComputerWeekly.com

September 2012 - (Free Research)
How do you measure the value of training to the business ? These tips will help you develop your business case. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Data Protection Solutions at Midsize Organizations by Trend Micro, Inc.

February 2008 - (Free Research)
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more. 
(WHITE PAPER) READ ABSTRACT |

Facilitating “sound practices” in risk management with IBM OpenPages ORM by IBM

February 2012 - (Free Research)
This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee. 
(WHITE PAPER) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs by Lumension

May 2009 - (Free Research)
This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management. 
(ANALYST REPORT) READ ABSTRACT |

Deloitte Consulting Presents: Risk and TCO in Single and Multivendor Networks by Cisco Systems, Inc.

March 2012 - (Free Research)
Can a multivendor network infrastructure actually reduce your overall costs, as some claim? To answer this question, Deloitte Consulting conducted in-depth research looking at enterprises' total cost of ownership (TCO), including capital outlays, operating expenses, and analyzed risks associated with the network. 
(WHITE PAPER)

Computer Forensics and its Role in the Risk Management Process by IBM

May 2011 - (Free Research)
The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies. 
(EGUIDE) READ ABSTRACT |

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements by Oracle Corporation

January 2012 - (Free Research)
Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy. 
(WHITE PAPER)

End-User Monitoring: Gaining Visibility into Hidden Business Risks by CA Technologies.

August 2008 - (Free Research)
This white paper explores how to implement effective end-user transaction monitoring and management to attain greater visibility into the user experience. 
(WHITE PAPER) READ ABSTRACT |

Four Steps to Cure Your Patch Management Headache by Lumension

February 2010 - (Free Research)
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. 
(WHITE PAPER) READ ABSTRACT |

Business in the Cloud: Will Your Internet Connectivity Provide a Positive ROI? by Internap Network Services

April 2010 - (Free Research)
Using a simple Return on Investment (ROI) approach, enterprises can quantify the value of best-in-class connectivity. What are the tangible financial drawbacks when you experience outages or latency? How do you measure your risk and then mitigate it? This paper addresses all the factors associated with being able to calculate your own ROI. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

Secure Smartphone Apps: The Next Generation by BlackBerry

April 2010 - (Free Research)
The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts