Risk SoftwareWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Software returned the following results.
RSS What is RSS?
Related Categories

 •   Treasury / Cash / Risk Management
 •   Application Security
 •   Security Monitoring
 •   Business Process Management (BPM)
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Vulnerability Assessment
 •   Application Lifecycle Management(ALM)
 •   Automated Software Quality (ASQ)
 •   Network Security
 •   Security Policies

Related Searches
 •   Info Risk Software
 •   Manufacturers Risk
 •   Need Risk Software
 •   Planner Risk Software
 •   Reporting Risk Software
 •   Risk Devices
 •   Risk Maintain
 •   Risk Software Conversions
 •   Risk Software Decision
 •   Risk Software Enterprise
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Proactive technical support: the overlooked essential in business resilience: Combine hardware and software technical support with business continuity and disaster recovery plans by IBM

October 25, 2011 - (Free Research)
Read this white paper and discover how IBM tech support solutions fit into every good resiliency plan and what to look for in a good business resilience vendor. 
(WHITE PAPER) READ ABSTRACT |

Moving Up the Software License Optimization Maturity Curve to Drive Business Value by Flexera Software

February 28, 2013 - (Free Research)
Defining and implementing a strategy for software asset management (SAM) and license optimization isn't easy -- but with the right tools and processes, it's definitely possible. Access this informative resource to explore the common challenges of SAM, and how you can ensure your software license optimization program is on its way to full maturity. 
(WHITE PAPER) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 26, 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Software Quality Optimization: Business Transformation and Risk by IBM

March 10, 2009 - (Free Research)
Information technology is undergoing constant innovation. To keep pace, software development organizations need to release business-critical software in less time, but this increases risk and often results in compromised quality. So the question becomes: How can you save time and reduce costs without sacrificing quality? Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Reducing Risk through Requirements-driven Quality Management: An End-to-end Approach by Hewlett-Packard Company

December 23, 2008 - (Free Research)
This white paper explains a structured way to manage requirements and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system. 
(WHITE PAPER) READ ABSTRACT |

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 23, 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

Value-Driven Quality Management for Complex Systems: Six Strategies for Reducing Cost and Risk by IBM

July 08, 2010 - (Free Research)
This paper looks at quality strategies which deliver a positive operational return on investment, improving quality whilst reducing cost and risk. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by FrontRange Solutions Inc

July 2008 - (Free Research)
Software Asset Management (SAM) can deliver increased efficiency, better cost control, risk mitigation and patch management. This paper provides an overview of SAM benefits, and addresses the specific issues in getting SAM running in your company. 
(WHITE PAPER) READ ABSTRACT |

HP Fortify Software Security Center- Proactively Eliminate Risk in Software by Hewlett-Packard Company

August 2012 - (Free Research)
Learn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook. 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report by Veracode, Inc.

February 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

Safeguard the Implementation of New Technology: Reduce Implementation Risk and Optimize Performance by SAP America, Inc.

September 2010 - (Free Research)
Organizations have increasingly complex software, interface, and IT landscapes. This paper explains how the SAP Safeguarding for Integration Validation portfolio of services offers the process, tools, and expertise you need to reduce the technical risk and cost associated with implementing new software solutions. 
(WHITE PAPER) READ ABSTRACT |

Delivering high quality applications faster with reduced risk & cost by IBM

September 2011 - (Free Research)
Improve time to value and quality by reducing rework and cost through faster stakeholder consensus, increased productivity, better process automation, and anytime-anywhere decision support for application software. Download the paper for more information on delivering high quality applications faster with reduced risk & cost. 
(WHITE PAPER) READ ABSTRACT |

Reduce risk of applicationfailures: HP Testing and QA Services At A Glance by Hewlett-Packard Company

October 2013 - (Free Research)
View this resource to learn more about how you can deliver quality management and testing services to eliminate waste in the systems engineering process and reduce the risk of system outages from software failures. 
(WHITE PAPER) READ ABSTRACT |

Reducing Risk through Requirements-driven Quality Management: An End-to-End Approach by Hewlett-Packard Company

May 2007 - (Free Research)
Read this white paper to learn a structured way to manage requirements, and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system. 
(WHITE PAPER) READ ABSTRACT |

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Delivering Value Through Quality Management and Best Practices: Strategies for Reducing Cost and Risk by IBM Rational

January 2011 - (Free Research)
Read this presentation transcript from IBM as it explores quality management strategies that can deliver a positive ROI while at the same time improving delivered quality and reducing risk and uncertainty in development projects. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Rentokil Initial Improves Software Asset Management by Flexera Software

October 2011 - (Free Research)
Rentokil Initial, one of the largest business services companies in the world, was struggling with managing their software assets. In this case study, find out how Rentokil was able to implement a mature software asset management process and gain complete control over their software licenses, for reduced costs and lower risk. 
(CASE STUDY) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by Centennial-Software

July 2008 - (Free Research)
This white paper provides a general overview of SAM benefits, and then addresses the specific issues involved in getting SAM up and running in your organization. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Value with Oracle Governance, Risk & Compliance by Oracle Corporation

October 2010 - (Free Research)
In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients. 
(WHITE PAPER) READ ABSTRACT |

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk by Pitney Bowes Group 1 Software

April 2008 - (Free Research)
What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Risk Management: Enabling Risk-Adjusted Management of Strategy and Performance by SAP AG

September 2010 - (Free Research)
Find out how SAP software allows you to identify, mitigate, and manage risk so that you can increase visibility into the impact of risks, reduce cost and risk across strategic initiatives, and increase your strategic effectiveness. 
(VIDEO) READ ABSTRACT |

Accelerate the Software Development Lifecycle by Parasoft Corporation

January 2014 - (Free Research)
Access the following web presentation to uncover expert tips and tricks to leverage service virtualization to accelerate the SDLC. Discover how you can easily implement these techniques and more to gain data acceleration benefits but more importantly, how you can improve software deliverables. 
(WEBCAST) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts