Research About Risks OfWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research About Risks Of returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Endpoint Security
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Authentication / Password Management
 •   Virtualization
 •   Network Management

Related Searches
 •   Events Research About Risks
 •   Free Research
 •   Questions Research
 •   Record Research
 •   Research About Risks Budgeting
 •   Research About Risks Buys
 •   Research About Risks Problem
 •   Research Manufacturers
 •   Software Research About
 •   Softwares Research About Risks
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Location, Location, Location! Best Practices for Selecting Onshore, Nearshore or Offshore Technology Services by Fairway Technologies, Inc.

November 02, 2010 - (Free Research)
This white paper provides an overview of ITO, presents benefit and risk assessments of onshore, nearshore and offshore ITO, and offers best practices to assist in selecting an ITO provider. This paper is based on research compiled from published literature as well as interviews and surveys of technology professionals possessing ITO experience. 
(WHITE PAPER) READ ABSTRACT |

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 10, 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Software Quality Optimization: Business Transformation and Risk by IBM

March 10, 2009 - (Free Research)
Information technology is undergoing constant innovation. To keep pace, software development organizations need to release business-critical software in less time, but this increases risk and often results in compromised quality. So the question becomes: How can you save time and reduce costs without sacrificing quality? Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Detecting Malware Threats Based on File Size by Fortinet, Inc.

December 2006 - (Free Research)
Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

CFO Executive Briefing: How confident are you about your company expenses? by Concur Technologies (E-mail this company)

April 2014 - (Free Research)
Miscalculations, human error, and outdated software can all add extra zeros to your expenses bill. This resource explores the risks of errors related to travel and entertainment (T&E) spending, and offers insight to help CFOs cut costs and fuel success. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

BeyeNETWORK Research Report: Open Source Solutions: Managing, Analyzing and Delivering Business Information by Pentaho Corporation

March 2010 - (Free Research)
This survey report examines the usage of open source solutions within the BI and data warehousing market, describes what software is being deployed and presents the benefits and challenges of adopting open source technologies. Learn the rationale, practices and benefits that are driving use of open source as an alternative to traditional vendors. 
(WHITE PAPER) READ ABSTRACT |

Reducing the risk of development failure with cost-effective capture and management of requirements by IBM

July 2013 - (Free Research)
In this paper from Bloor research, explore the key success factors of effective requirements management, and discover some of the tools offered to help you achieve your goal. Learn the business value of these requirements management tools, and how your organization can enjoy some of the benefits that real-world companies experienced. 
(WHITE PAPER) READ ABSTRACT |

Working Together To Improve Strategic Planning by Oracle Corporation

December 2009 - (Free Research)
Read this paper for compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning. 
(WHITE PAPER) READ ABSTRACT |

BSM in the Cloud with Forrester Research, Part 1: Managing an End-to-End View Made Simple by Novell, Inc.

October 2010 - (Free Research)
Take advantage of the flexibility and cost reductions virtualizing your environment brings. Remove the risk of a service impacting event and enjoy further cost reductions in management of your virtualized environment. Watch this Novell webcast to learn more. 
(WEBCAST) READ ABSTRACT |

Working Together To Improve Strategic Planning by Oracle Corporation

October 2010 - (Free Research)
This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Risk of Catastrophic Failure in the Software Defined Data Center by nlyte Software

September 2013 - (Free Research)
This webcast covers software-defined data centers and how to implement them successfully and avoid catastrophic failure. 
(VIDEO) READ ABSTRACT |

Reduce risk of applicationfailures: HP Testing and QA Services At A Glance by Hewlett-Packard Company

October 2013 - (Free Research)
View this resource to learn more about how you can deliver quality management and testing services to eliminate waste in the systems engineering process and reduce the risk of system outages from software failures. 
(WHITE PAPER) READ ABSTRACT |

Controlling High Fraud Risk of International Transactions iovation Reputation Services by iovation, Inc.

March 2008 - (Free Research)
Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: How to Minimize the Risk of Attacks by Qualys

July 2012 - (Free Research)
This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys

March 2009 - (Free Research)
Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options. 
(WHITE PAPER) READ ABSTRACT |

Monitor and Protect Critical Web Applications with a Web Application Firewall by Imperva

February 2014 - (Free Research)
While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection. 
(WEBCAST) READ ABSTRACT |

Best Practices for Endpoint Data Loss Prevention by Symantec Corporation

September 2008 - (Free Research)
Find out the best practices for planning for and deploying an endpoint DLP tool in your corporation. The technology overview section of this document provides a closer look on how DLP works with other existing technologies and how best to integrate DLP in your environment. 
(WHITE PAPER) READ ABSTRACT |

Effective print security for SMBs by ComputerWeekly.com

April 2013 - (Free Research)
Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security. 
(ANALYST REPORT) READ ABSTRACT |

The E-discovery Ostrich by Iron Mountain

March 2013 - (Free Research)
This white paper highlights four simple steps that will ensure your organization is ready for e-discovery. Learn what a failure to plan for an e-discovery mandate can really cost your business, and discover why a little foresight can go a long way toward peace of mind. 
(WHITE PAPER) READ ABSTRACT |

Web security buyers guide by Sophos, Inc.

October 2010 - (Free Research)
A new approach to web security and control is required that supports the needs of businesses, equipping users with the tools they need to be more effective while eliminating the risks of potential infection from trusted legitimate sites. In addition to good preventive practices it is vital that organizations implement a comprehensive solution. 
(WHITE PAPER) READ ABSTRACT |

Minimize the Risk of Your Cloud-Based Services by Hewlett-Packard Limited

April 2012 - (Free Research)
This guide dives into how you can minimize the risk of your cloud-based services and reap the benefits of a fully protected cloud. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts