Risk Mitigation Security BusinessesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Mitigation Security Businesses returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Treasury / Cash / Risk Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Endpoint Security
 •   Application Security

Related Searches
 •   Configuration Risk Mitigation
 •   Conversion Risk
 •   Full Risk Mitigation Security
 •   Risk Measures
 •   Risk Mitigation Improvement
 •   Risk Mitigation Rfp
 •   Risk Mitigation Wyoming
 •   Risk Schedule
 •   Risk Spreadsheets
 •   Simple Risk Mitigation Security
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The IBM Data Governance Unified Process: Driving Business Value with IBM Software and Best Practices Book (Sunil Soares) by IBM

March 16, 2011 - (Free Research)
This 150 page book by Sunil Soares provides a practical set of detailed steps and sub-steps to implement an Information Governance program, as well as the associated automation provided by IBM Software. 
(BOOK) READ ABSTRACT |

Strategy Guide to Risk Mitigation for Midsize Businesses by HP & Intel®

June 29, 2010 - (Free Research)
This strategy guide offers concrete risk mitigation techniques specifically designed for midsize organizations. Learn how to proactively manage physical and virtual systems and see the early signs of infrastructure trouble to avoid outages. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Risk Mitigation – Bang for the Buck by ActivIdentity Corporation

March 21, 2011 - (Free Research)
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Strategy Guide to Risk Mitigation for Healthcare by HP & Intel®

June 29, 2010 - (Free Research)
If a server goes down in a hospital, it is a matter of life and death. Learn how healthcare IT managers are keeping their data centers up and running 24/7 with an infrastructure that is robust enough to support new healthcare IT initiatives, including Electronic Medical Records systems. 
(WHITE PAPER) READ ABSTRACT |

Strategy Guide to Business Risk Mitigation for Midsize Businesses by HP & Intel®

March 21, 2011 - (Free Research)
Businesses that need to control costs and reduce their vulnerabilities should access this multimedia white paper, which provides a combination of authoritative industry research and analysis, combined with three real-world case studies of companies that took strategic views of business risk mitigation for their branch offices. 
(WHITE PAPER) READ ABSTRACT |

Strategy Guide to Business Risk Mitigation for Healthcare by HP & Intel®

March 21, 2011 - (Free Research)
This whitepaper is a rich media document, and includes IDC Analyst Research, multimedia content, risk assessment tool, solutions brief and up to 3 detailed customer case studies, all embedded within this single dossier. 
(WHITE PAPER) READ ABSTRACT |

Vendor Report: CA Technologies Virtualization Security by CA Technologies

December 10, 2010 - (Free Research)
CA Technologies offers a broad range of products which support customers in implementing Virtualization Security. CA Technologies specific strengths are not only that core security is provided but also IT service automation, assurance, management and other areas are covered as well. Continue reading this report to learn more. 
(ANALYST REPORT) READ ABSTRACT |

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation by IBM

June 2008 - (Free Research)
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed. 
(WHITE PAPER)

Considerations for Integrating Intelligence into Security Operations by VeriSign EMEA

December 2009 - (Free Research)
This whitepaper outlines four critical elements of cyber security intelligence that organizations must meet to ensure that the integration of the intelligence will help improve the safety and profitability of enterprises. This paper also presents specific questions to ask when determining the best approach for an overall risk-mitigation strategy. 
(WHITE PAPER) READ ABSTRACT |

Maximizing ERP Return on Investment with On-Demand Support Services by itelligence, Inc.

May 2009 - (Free Research)
The current economic environment challenges manufacturers seeking to capitalize on their enterprise resource planning (ERP) software: How can a company increase ERP functionality while reducing operating costs and even head counts? To achieve this difficult balance, many manufacturers have turned to on-demand ERP-support services. 
(WHITE PAPER) READ ABSTRACT |

What Is Your Mobile Content Policy? A Checklist for Content Risk Mitigation by SAP AG

July 2013 - (Free Research)
This helpful paper discusses how to approach secure content management in the age of mobility, examining how to implement secure mobile content risk mitigation and what you can do to ensure your mobile data stays in the right hands. 
(WHITE PAPER) READ ABSTRACT |

DDoS Attacks Reach Critical Levels: How to Proactively Combat Network Threats by Verisign, Inc.

December 2012 - (Free Research)
This paper draws on Verisign's DDoS mitigation expertise to examine the threat of DDoS in the context of IT availability and enterprise risk management. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

5 Ways To Secure Removable Media: Which Is Best For Your Enterprise? by WinMagic

March 2010 - (Free Research)
This paper reviews the steps some organizations are taking to draft, implement, and enforce risk mitigation policies for removable media, and how technologies available today, and appearing on the horizon, are helping. 
(WHITE PAPER) READ ABSTRACT |

DDoS Mitigation and DNS Availability: Key Components of Your Resiliency Strategy by Verisign, Inc.

December 2013 - (Free Research)
This white paper provides enterprises with a list of recommendations for ensuring resiliency and minimizing risk in the event of a DDoS or DNS attack. 
(WHITE PAPER) READ ABSTRACT |

Targeted attacks: Preparation and Mitigation by SearchSecurity.com

May 2013 - (Free Research)
This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy. 
(EGUIDE) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

Four Steps to Cure Your Patch Management Headache by Lumension

February 2010 - (Free Research)
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. 
(WHITE PAPER) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by Centennial-Software

July 2008 - (Free Research)
This white paper provides a general overview of SAM benefits, and then addresses the specific issues involved in getting SAM up and running in your organization. 
(WHITE PAPER) READ ABSTRACT |

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness by IBM

January 2014 - (Free Research)
This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations by Dell, Inc. and Intel®

March 2014 - (Free Research)
This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider. 
(EGUIDE) READ ABSTRACT |

Taking a Strategic Approach to Risk Management by TraceSecurity

December 2012 - (Free Research)
This e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more. 
(EGUIDE) READ ABSTRACT |

Security strategy roadmap for cloud computing by IBM

April 2012 - (Free Research)
The benefits of the cloud cannot be fully realized without tackling the security and privacy concerns associated with cloud environments. In this resource, uncover a security roadmap that can help you build a sound approach for successfully achieving your cloud security needs. 
(DATA SHEET) READ ABSTRACT |

Securing Medical Devices by McAfee, Inc.

May 2012 - (Free Research)
This white paper highlights a centralized, efficient and effective risk mitigation solution for the health care industry. Within, discover how to implement the necessary controls to significantly reduce the potential compromise of sensitive patient information. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts