Risk ComputersWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Computers returned the following results.
RSS What is RSS?
Related Categories

 •   Treasury / Cash / Risk Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Business Process Management (BPM)
 •   Security Policies
 •   Mobile Device Management
 •   Security Monitoring
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Automate Risk
 •   Flowchart Risk Computers
 •   Payment Risk
 •   Risk Computers Cycles
 •   Risk Computers Expert
 •   Risk Computers Support
 •   Risk Computers Tutorial
 •   Simple Risk Computers
 •   Training Risk Computers
 •   Unix Risk
Advertisement

ALL RESULTS
1 - 25 of 491 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly – 21 January 2014: The IT risks facing Universal Credit by ComputerWeekly.com

January 21, 2014 - (Free Research)
In this week's Computer Weekly, we examine the ongoing IT risks facing the UK government's highest-profile IT project – the troubled Universal Credit programme. We talk to IT leaders to find out their spending priorities for 2014. And we find out about the latest best practice in improving datacenter performance. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Forensics and its Role in the Risk Management Process by IBM

May 19, 2011 - (Free Research)
The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies. 
(EGUIDE) READ ABSTRACT |

NAC: Managing Unauthorized Computers by Sophos, Inc.

February 2008 - (Free Research)
Unauthorized endpoint computers pose security risks to organizations. This paper looks at how a complete Network Access Control (NAC) solution can protect the network from unauthorized access from unknown computers or people with malicious intent. 
(WHITE PAPER) READ ABSTRACT |

Increase Productivity and Reduce Security Risks for Teleworkers by SonicWALL

April 2008 - (Free Research)
This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

Understanding the risks of mobile apps by Veracode, Inc.

May 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 20 November 2012: Inside the £65m datacentre supporting Tesco's online strategy by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we visit the £65m datacentre that sits at the heart of Tesco's ambitious online strategy. Government has approved the iPhone for use by Whitehall officials – we assess the risks. And the CIO at British Gas talks about how IT transformed the firm's customer service. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly Buyer's Guide to Cloud Storage by TechTarget

March 2014 - (Free Research)
Cloud storage technologies have triggered various disruptive file-sharing applications which have changed the game in regard to collaboration and creativity, but can be costly. In "A Computer Weekly Buyer's Guide to Cloud Storage," take a look at the risks and opportunity costs different applications present. 
(RESOURCE)

CW Buyers Guide To Finance and Insurance by ComputerWeekly.com

February 2014 - (Free Research)
This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Risk Management and Product Delivery in Consumer Lending by ILOG, an IBM Company

September 2008 - (Free Research)
Amid the ongoing impact of the sub-prime meltdown and the ensuing credit crunch, lenders are facing a much tougher market than has been seen for some time. Business Rules Management Systems (BRMS) can enhance risk management, lending process streamlining and flexibility. 
(WHITE PAPER) READ ABSTRACT |

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk by IBM Line of Business

June 2008 - (Free Research)
Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price. 
(WHITE PAPER)

Governance, Risk, and Compliance Management: Realizing the Value Of Cross-Enterprise Solutions by SAP America, Inc.

January 2007 - (Free Research)
This paper explains SAP’s vision for a cross-enterprise GRC solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options. 
(WHITE PAPER) READ ABSTRACT |

Data Discovery and Risk in the Datacenter by Tizor

October 2008 - (Free Research)
Learn how database activity monitoring (DAM) solutions mitigate data risk by discovering critical data in the data center, monitoring and analyzing activity, providing detailed auditing trails, and reporting on all user access. 
(WHITE PAPER) READ ABSTRACT |

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation by IBM

June 2008 - (Free Research)
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed. 
(WHITE PAPER)

Computer Weekly – 28 January 2014: Tablets in the workplace by ComputerWeekly.com

January 2014 - (Free Research)
In this week's Computer Weekly, our latest buyer's guide examines the rise of tablets in the workplace, and how to fit them in to the corporate IT environment. We look at the risks to the UK banking system from over-reliance on legacy IT. And we find out how flash storage can help improve application performance. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 16 July 2013: Cloud takes to the stage at the Royal Opera House by ComputerWeekly.com

July 2013 - (Free Research)
In this week's Computer Weekly, we talk to the Royal Opera House about how using public cloud boosted ticket sales and improved performance of its IT infrastructure. We examine why agile development failed in the government's flagship Universal Credit welfare programme. And we analyse the real risks of sweating your IT assets. Read the issue now. 
(EZINE) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

Handle with Care: Calculating and managing risk is tricky business by SearchSecurity.co.UK

March 2011 - (Free Research)
In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape. 
(EZINE)

Managing Risk in Outsourced Manufacturing by E2open

December 2008 - (Free Research)
This white paper looks at some of the management risks and challenges associated with outsourced manufacturing strategies and summarizes the proven ways used by companies that have successfully resolved or mitigated these risks. 
(WHITE PAPER) READ ABSTRACT |

Webcast - Closing the Four Security Risk Gaps of Mainframe Console Access by I/O Concepts Inc.

December 2008 - (Free Research)
The information presented in this webcast can help you be sure your company's commitment to security includes all levels of mainframe access. 
(WEBCAST) READ ABSTRACT |

Monitoring for SAP: High-Risk Financial Transactions in Real Time by Security Weaver

February 2009 - (Free Research)
For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP. 
(WHITE PAPER) READ ABSTRACT |

3 Key Components of a Risk-Based Security Plan by Foundstone, Inc.

June 2008 - (Free Research)
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 491 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts