Reducing Risk In SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Reducing Risk In Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Application Security
 •   Access Control
 •   Identity Management/ User Provisioning
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security

Related Searches
 •   Advantages Of Reducing Risk In
 •   Codes Reducing
 •   Commercial Reducing Risk
 •   Learn About Reducing Risk In
 •   Manuals Reducing Risk In
 •   Reducing Basic
 •   Reducing Faq
 •   Reducing Risk In Email
 •   Research About Reducing Risk
 •   Technical Reducing Risk
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Five Tips to Reduce Risk From Modern Web Threats by Sophos, Inc.

September 30, 2013 - (Free Research)
Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats. 
(WHITE PAPER) READ ABSTRACT |

Content Encryption: Reduce Risk, Liability and Costs by Proofpoint, Inc.

August 31, 2011 - (Free Research)
Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry. 
(WHITE PAPER) READ ABSTRACT |

Reduce Risks and Protect Critical Information with Ease - Presentation Transcript by Symantec

August 02, 2010 - (Free Research)
The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Governance and Control of Privileged Identities to Reduce Risk by CA Technologies.

February 28, 2013 - (Free Research)
This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Reduce risk of applicationfailures: HP Testing and QA Services At A Glance by Hewlett-Packard Company

October 08, 2013 - (Free Research)
View this resource to learn more about how you can deliver quality management and testing services to eliminate waste in the systems engineering process and reduce the risk of system outages from software failures. 
(WHITE PAPER) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by FrontRange Solutions Inc

July 2008 - (Free Research)
Software Asset Management (SAM) can deliver increased efficiency, better cost control, risk mitigation and patch management. This paper provides an overview of SAM benefits, and addresses the specific issues in getting SAM running in your company. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by Centennial-Software

July 2008 - (Free Research)
This white paper provides a general overview of SAM benefits, and then addresses the specific issues involved in getting SAM up and running in your organization. 
(WHITE PAPER) READ ABSTRACT |

Information governance: Reduce risk and improve compliance by Iron Mountain

August 2012 - (Free Research)
This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs. 
(WHITE PAPER) READ ABSTRACT |

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks? by CA Technologies.

February 2012 - (Free Research)
Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency. 
(WHITE PAPER) READ ABSTRACT |

How can Identity and Access Management Improve IT Security and Reduce Risk to Help Drive my Business? by CA Technologies.

September 2010 - (Free Research)
IAM builds a foundation for effective security by helping ensure all users have only the appropriate level of access rights to all protected resources, and that those rights are enforced appropriately. Read this executive brief to learn more about taking control of IT operations and information security with Content-Aware IAM. 
(WHITE PAPER) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 2012 - (Free Research)
<p>To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.</p> 
(WHITE PAPER) READ ABSTRACT |

Manage Identity and Access for Continuous Compliance and Reduced Risk by IBM

February 2014 - (Free Research)
This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity. 
(WHITE PAPER) READ ABSTRACT |

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line by NetIQ

December 2013 - (Free Research)
This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Save Money, Reduce Risk, and Increase Agility When Deploying Oracle Database Systems by Oracle Corporation

December 2013 - (Free Research)
In this white paper, learn how Oracle Optimized Solution for Oracle Database promises to help IT consolidate database services, better utilize resources, and contain infrastructure costs. 
(WHITE PAPER) READ ABSTRACT |

Using application control to reduce risk with endpoint security by Sophos, Inc.

July 2011 - (Free Research)
Unauthorized applications should be a prime consideration for applying application control, as it increases the risk of malware infections and data loss. View this paper to explore how integrating application control with endpoint solutions can provide the most efficient and comprehensive defense against unwanted applications. 
(WHITE PAPER) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 2011 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

Delivering high quality applications faster with reduced risk & cost by IBM

September 2011 - (Free Research)
Improve time to value and quality by reducing rework and cost through faster stakeholder consensus, increased productivity, better process automation, and anytime-anywhere decision support for application software. Download the paper for more information on delivering high quality applications faster with reduced risk & cost. 
(WHITE PAPER) READ ABSTRACT |

 Five tips to reduce risk from modern web threats by Sophos, Inc.

October 2010 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management by CA Technologies.

January 2013 - (Free Research)
This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats. 
(WHITE PAPER) READ ABSTRACT |

Reducing Risk through Requirements-driven Quality Management: An End-to-end Approach by Hewlett-Packard Company

December 2008 - (Free Research)
This white paper explains a structured way to manage requirements and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system. 
(WHITE PAPER) READ ABSTRACT |

Build in security and drive innovation by IBM

November 2011 - (Free Research)
Hear from Patrick Vandenberg, IBM Security & Compliance Marketing Manager and Ewa Hoyt, IBM Security Application & Compliance Marketing manager, on how to make application security part of your development process. Reduce risk and costs, and keep your development teams productive to drive the innovation you need to compete and win. 
(PODCAST) READ ABSTRACT |

Reducing risk through requirements-driven quality management: An end-to-end approach by Hewlett-Packard Company

February 2008 - (Free Research)
When IT initiates a project, the department makes a commitment to the business to ensure quality and success when it is deployed. Learn how requirements management helps IT quantify project risks and make informed decisions about resource allocation. 
(WHITE PAPER) READ ABSTRACT |

Mission Critical Services by Hewlett-Packard Company

December 2008 - (Free Research)
In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management. 
(WEBCAST) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts