Risks ItWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risks It returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Application Lifecycle Management(ALM)
 •   Endpoint Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Mobile Device Management
 •   Security Policies
 •   Technology ROI Tools

Related Searches
 •   E-Commerce Risks It
 •   Indian Risks It
 •   Risks Hardware Provider
 •   Risks It Company
 •   Risks It Downloads
 •   Risks It E-Commerce
 •   Risks It New York
 •   Risks It Professional
 •   Schedule Risks It
 •   Wireless Risks It
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

De-risking IT Lifecycle Management by ComputerWeekly.com

November 23, 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Architecture of Next-Generation Intraday Liquidity Risk Management by IBM

September 30, 2013 - (Free Research)
This paper explores potential risk solutions to this challenge, establishing the historic context of liquidity risk management and the specific business problem of intraday liquidity risk. 
(WHITE PAPER) READ ABSTRACT |

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 04, 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

Aligning IT and Business with Demand Management by SERENA Software, Inc.

June 2008 - (Free Research)
Demand Management (DM) is a component of a full-featured Project Portfolio Management (PPM) practice. Demand comes from many sources and all phases of the project lifecycle. Capacity management must consider all of these. 
(WHITE PAPER) READ ABSTRACT |

IBM Rear Door Heat Exchanger by IBM

October 2008 - (Free Research)
This IBM white paper helps you to understand what's happening in an overheated system and to see if yours is at risk, it also explains how the IBM Rear Door Heat eXchanger helps to dramatically reduce data center power consumption. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security Best Practices for BYOD by SearchSecurity.com

April 2012 - (Free Research)
This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization. 
(EGUIDE) READ ABSTRACT |

Understanding and Managing Supply Chain Risk by SAP America, Inc.

January 2006 - (Free Research)
Download this white paper and explore new thinking on potential risk to global supply chains and how companies are adopting the statistical methods more commonly associated with finance and insurance. Learn how identifying and profiling risk variables, quantifying risk and using IT solutions can create higher resilience for supply chain management. 
(WHITE PAPER) READ ABSTRACT |

Managed Services or Break fix? One Size Doesn’t Fit All by GFI Software

December 2010 - (Free Research)
This paper examines the benefits of Managed Services using the GFI Building Blocks program. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Application Delivery: No User Left Behind by BlueCoat

January 2007 - (Free Research)
Blue Coat ProxyClient extends Blue Coat's visionary application delivery infrastructure to include all of these use cases - from any network, any device, and to any application - keeping users productive wherever the business takes them. 
(WHITE PAPER) READ ABSTRACT |

How to Save Time and Money Making Your Transition to IPv6 by Cisco Systems, Inc.

October 2011 - (Free Research)
This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks. 
(WHITE PAPER) READ ABSTRACT |

Keeping Your Data Center Cool - There Is Another Way by IBM

May 2008 - (Free Research)
This white paper helps you to understand what's happening in an overheated system and to see if yours is at risk and also explains how the IBM Rear Door Heat exchanger helps to dramatically reduce data center power consumption. 
(WHITE PAPER)

Continuous Mobile Application Testing With SOASTA TouchTest TM by SOASTA, Inc

September 2012 - (Free Research)
Read this white paper to learn about the challenges associated with testing mobile applications and how to overcome them. Also, find a blueprint for how continuous mobile application testing should be executed in the software development lifecycle (SDLC). 
(WHITE PAPER) READ ABSTRACT |

Managing the Cost and Complexity of Compliance through Governance by McAfee, Inc.

October 2009 - (Free Research)
Read this presentation transcript for a discussion on risk management, corporate governance, regulatory compliance, and information quality presented by speaker Laurence Anker. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuration and Change Management for IT Compliance and Risk Management by Tripwire, Inc.

November 2007 - (Free Research)
This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements. 
(WHITE PAPER) READ ABSTRACT |

Automating a Unified Physical Infrastructure by Panduit

August 2010 - (Free Research)
Read our fourth newsletter featuring research from Gartner to learn how to support business requirements and customer demands in the datacenter while reducing capital and operational expenses. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth by ESET

December 2009 - (Free Research)
The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

10 Steps to Email Security by Clearswift

August 2013 - (Free Research)
This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure. 
(WHITE PAPER) READ ABSTRACT |

How to write a RFP for Master Data Management: 10 Common Mistakes to Avoid by Siperian, Inc.

September 2007 - (Free Research)
Critical master data management (MDM) functionality can be easily overlooked when request for proposals (RFPs) are narrowly focused on a single business data type. Ensure success by avoiding 10 costly mistakes when writing your RFP. 
(WHITE PAPER) READ ABSTRACT |

Aligning Your Business Needs with Veeam Backup & Replication by Veeam Software

January 2014 - (Free Research)
Read through this in-depth white paper to find out how critical your data and systems are to your company, and how this vendor's backup and replication solution can provide you with superior data protection. 
(WHITE PAPER) READ ABSTRACT |

The Power of Singular Information Management by CommVault Systems, Inc.

November 2013 - (Free Research)
This video explains the benefits of a singular information management system and explains how it can help to eliminate disparate and overlapping data processes. 
(VIDEO) READ ABSTRACT |

Business in the Cloud: Will Your Internet Connectivity Provide a Positive ROI? by Internap Network Services

April 2010 - (Free Research)
Using a simple Return on Investment (ROI) approach, enterprises can quantify the value of best-in-class connectivity. What are the tangible financial drawbacks when you experience outages or latency? How do you measure your risk and then mitigate it? This paper addresses all the factors associated with being able to calculate your own ROI. 
(WHITE PAPER) READ ABSTRACT |

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network by Motorola, Inc.

May 2007 - (Free Research)
This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own. 
(WHITE PAPER) READ ABSTRACT |

Justifying a Computer Incident Response Plan by Dell SecureWorks UK

February 2013 - (Free Research)
This essential resource explores the need for effective incident response in order to reduce the costs of data breaches and mitigate risk. It also outlines best practices for creating an effective Computer Incident Response Plan (CIRP) – read on to learn more now. 
(WHITE PAPER) READ ABSTRACT |

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD by SearchSecurity.com

November 2012 - (Free Research)
BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise. 
(EBOOK) READ ABSTRACT |

Cloud Management: Overcoming today’s Top Risks by SearchSecurity.com

April 2012 - (Free Research)
Under a cloud paradigm, as services become more concentrated, risks follow suit, so it is important to understand and account for these changes and adjust security programs accordingly. View this e-guide to explore the top security risks in cloud computing today and how to overcome them. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts