Purchasing Risk Assessment TemplatesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Purchasing Risk Assessment Templates returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Treasury / Cash / Risk Management
 •   Business Intelligence Solutions
 •   Vulnerability Assessment
 •   Enterprise Data Protection and Privacy
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Managed Security Services
 •   Business Process Management (BPM)

Related Searches
 •   Chart Purchasing
 •   Control Purchasing Risk Assessment
 •   Decision Purchasing Risk
 •   Global Purchasing Risk Assessment
 •   Purchasing Protocol
 •   Purchasing Risk Assessment Resources
 •   Purchasing Risk Code
 •   Purchasing Risk Flowchart
 •   Purchasing Risk Learning
 •   Purchasing Risk North Carolina
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Secure File Transfer in the Era of Compliance by Ipswitch WhatsUp Gold

July 30, 2007 - (Free Research)
Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: DR Checklist: Tailoring your Plan to your Organization's Needs by FalconStor Software

May 03, 2012 - (Free Research)
This E-Guide is your ticket to establishing a successful disaster recovery and business continuity strategy. 
(EGUIDE) READ ABSTRACT |

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 09, 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

Essential Guide: Getting started with disaster recovery planning by Riverbed Technology, Inc.

April 29, 2011 - (Free Research)
Whether you're new to IT disaster recovery planning or want to brush up on best practices, we have the answers for you in this essential DR planning guide. 
(EBOOK) READ ABSTRACT |

The N-able MSP Sales & Marketing Digital Binder by N-able Technologies

October 03, 2011 - (Free Research)
This digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects. 
(RESOURCE) READ ABSTRACT |

A Tour of HP Sarbanes-Oxley IT Assessment by Hewlett-Packard Company

April 01, 2009 - (Free Research)
This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans. 
(WHITE PAPER) READ ABSTRACT |

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

Presentation Transcript: Improve PeopleSoft Quality by Leveraging a Quality Assurance Center of Excellence Model by HP and FocusFrame

February 18, 2009 - (Free Research)
Read this webcast transcript and learn how to leverage industry-leading quality management software and best practices to reduce test cycle time, decrease project risk, and increase the quality of your PeopleSoft applications. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects by HCL Technologies Ltd.

June 2008 - (Free Research)
This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool. 
(WHITE PAPER) READ ABSTRACT |

New Storage Buying Criteria for Shared Virtual Infrastructure by NetApp

September 2010 - (Free Research)
You can’t make the best storage decisions for your business if you’re not asking the right questions. Our “New Storage Buying Criteria for Shared Virtual Infrastructure RFP template” makes it easy. Use it to help ensure the solutions you choose can deliver extreme flexibility and efficiency, and a “future-proof” foundation. 
(WHITE PAPER) READ ABSTRACT |

How to tackle trust and co-operation by ComputerWeekly.com

November 2010 - (Free Research)
It is well-known that eCommerce transactions require a level of trust between participants in that trust, in this context, gives each partner confidence that the other will fulfil his part of a bargain in the future. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

IT Courseware by SkillSoft Corporation

SkillSoft's IT Skills instruction is designed to encourage and prompt frequent learner interaction with the course content. SkillSoft maintains courseware integrity and effectiveness by offering a balance of thorough instruction, challenging practice exercises and quizzes. 
(ASP & SOFTWARE PRODUCT)

Predictive Security Intelligence for Retail Organizations by Q1 Labs, an IBM Company

February 2012 - (Free Research)
This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management. 
(WEBCAST) READ ABSTRACT |

Enterprise Report Management: A Market Assessment by IBM

September 2008 - (Free Research)
This white paper from AIIM International is based on findings from a recent survey conducted by AIIM on enterprise report management (ERM). 
(WHITE PAPER) READ ABSTRACT |

Scribe Insight Architecture Overview: A TECHNICAL OVERVIEW OF THE SCRIBE INTEGRATION TOOL by Scribe Software Corporation

March 2008 - (Free Research)
Scribe Insight has been specifically designed to support the effective deployment of a number of market leading business applications including Microsoft Dynamics CRM, Salesforce, SalesLogix, and Microsoft Dynamics GP. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management - Methods and tools by SearchSecurity.com & SearchCompliance.com

May 2009 - (Free Research)
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business. 
(EBOOK) READ ABSTRACT |

Understanding and Selecting a Database Assessment Solution by Application Security, Inc.

February 2010 - (Free Research)
In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment. 
(ANALYST REPORT) READ ABSTRACT |

SL Enterprise RTView for Operational and Strategic Dashboards by SL Corporation

February 2008 - (Free Research)
SL Enterprise RTView is a business information delivery platform that is used by IT Managers to rapidly configure, deploy, maintain and extend real-time and other critical enterprise information systems. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS) by Trend Micro

December 2013 - (Free Research)
Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine, July 09: Controlling Privileged Accounts by Information Security Magazine

July 2009 - (Free Research)
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more. 
(EZINE)

E-commerce and Consumer Retailing: Risks and Benefits by ISACA

December 2010 - (Free Research)
ISACA recently unveiled the results of its 2010 survey "Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety." This white paper discusses many of the risks associated with such actions and provides recommendations for enterprises dealing with such challenges. 
(WHITE PAPER) READ ABSTRACT |

Location, Location, Location! Best Practices for Selecting Onshore, Nearshore or Offshore Technology Services by Fairway Technologies, Inc.

November 2010 - (Free Research)
This white paper provides an overview of ITO, presents benefit and risk assessments of onshore, nearshore and offshore ITO, and offers best practices to assist in selecting an ITO provider. This paper is based on research compiled from published literature as well as interviews and surveys of technology professionals possessing ITO experience. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts