Own Technology Risk AssessmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Own Technology Risk Assessment returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Security Policies
 •   Network Security
 •   Data Security
 •   Security Monitoring
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Treasury / Cash / Risk Management
 •   Application Security
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Buy Own
 •   Databases Own Technology Risk
 •   Expense Own Technology
 •   General Own
 •   Methods Own Technology
 •   Open Own
 •   Own Managing
 •   Own Technology Papers
 •   Own Technology Resource
 •   Statistics Own Technology Risk
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Guide: DR Checklist: Tailoring your Plan to your Organization's Needs by FalconStor Software

May 03, 2012 - (Free Research)
This E-Guide is your ticket to establishing a successful disaster recovery and business continuity strategy. 
(EGUIDE) READ ABSTRACT |

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects by HCL Technologies Ltd.

June 2008 - (Free Research)
This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

10 best practice suggestions for common smartphone threats by Dell SecureWorks UK

August 2011 - (Free Research)
Mobile devices have introduced a whole new set of risks into enterprise security, and IT teams need strategies to protect against them. Read this paper to uncover 10 of the most common threats associated with smartphones and mobile devices, along with best practices to help mitigate risks. 
(WHITE PAPER) READ ABSTRACT |

Why Readiness Assessments are Vital for Mobile Security by Cisco Systems, Inc.

December 2012 - (Free Research)
This whitepaper will help you determine if your network is properly secured against the vulnerabilities caused by BYOD. Inside, you'll find a series of questions you need to consider when it comes to your network policies, security resources and current management solutions. 
(WHITE PAPER) READ ABSTRACT |

Balancing compliance with information security threat assessment by IBM

December 2011 - (Free Research)
This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company. 
(EGUIDE) READ ABSTRACT |

What Changed? Leveraging the Power of Change Auditing by Tripwire, Inc.

December 2008 - (Free Research)
Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed. 
(PRODUCT OVERVIEW) READ ABSTRACT |

IBM X-Force 2011 Trend and Risk Report CIO Security Priorities by IBM

September 2012 - (Free Research)
Consult this informative white paper to learn more about the attack trends in 2011 including external network and security breaches. Discover key ways to prevent leaked customer data and inaccessible web services by analyzing the risks before it's too late. 
(WHITE PAPER) READ ABSTRACT |

Quantifying the Impact of Network-Based Attacks by Dell Software

December 2012 - (Free Research)
This document gives you some guidelines on how to assess the impact of network-based attacks and suggests techniques for creating your own economic model. Get your copy today. 
(WHITE PAPER) READ ABSTRACT |

Barclays Application Security Assurance Project by Veracode, Inc.

February 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Setting standards in IT Industries by DLT Solutions

March 2012 - (Free Research)
Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces. 
(EGUIDE) READ ABSTRACT |

Airspace Risk Assessment by AirTight Networks, Inc.

August 2008 - (Free Research)
This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture. 
(WHITE PAPER) READ ABSTRACT |

Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It by Symantec Corporation

October 2013 - (Free Research)
Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid. 
(WHITE PAPER) READ ABSTRACT |

EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard by Qualys, Inc.

May 2008 - (Free Research)
The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks. 
(CASE STUDY) READ ABSTRACT |

Mobile Security Strategies by ComputerWeekly.com

November 2012 - (Free Research)
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. 
(ANALYST REPORT) READ ABSTRACT |

Corporate Device Ownership and Top Security Concerns by BlackBerry

November 2013 - (Free Research)
This e-guide from the experts at SearchConsumerization.com compares the bring your own device (BYOD) and the corporate-owned, personally enabled (COPE) models of enterprise mobility. Also inside, uncover the perceptions and realities of BYOD security. 
(EGUIDE) READ ABSTRACT |

Ethical Hacking and Risk Assessments by Global Knowledge

December 2008 - (Free Research)
Attend this webcast to learn about risk assessment process and tools used by ethical hackers. 
(WEBCAST) READ ABSTRACT |

Essential Guide to HIPAA Compliance and Data Protection Strategies by SearchHealthIT.com and SearchSecurity.com

August 2011 - (Free Research)
Effectively addressing the new HIPAA privacy and security rules introduced in the HITECH Act requires an assessment of your organization’s biggest vulnerabilities as well as the deployment of the right technology to reduce the risk of data loss. Inside this expert resource, gain insight on current healthcare security topics. 
(EZINE)

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Five security considerations in the mobile age - Strengthen security in mobile environments with WebSphere DataPower appliances by IBM

December 2012 - (Free Research)
While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success. 
(WHITE PAPER) READ ABSTRACT |

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic” by Information Security Magazine

March 2011 - (Free Research)
This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology. 
(EZINE)

3 Key Components of a Risk-Based Security Plan by Foundstone, Inc.

June 2008 - (Free Research)
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts