Risks ManagerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risks Manager returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Treasury / Cash / Risk Management
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Monitoring
 •   Storage Security
 •   Data Security
 •   Managed Security Services
 •   Application Security

Related Searches
 •   Architecture Risks
 •   Cases Risks
 •   Learning About Risks Manager
 •   Portal Risks
 •   Risks Devices
 •   Risks Layout
 •   Risks Manager Service
 •   Risks Manager Strategy
 •   Risks Planner
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats by IBM

January 31, 2013 - (Free Research)
This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur. 
(WHITE PAPER) READ ABSTRACT |

Predictive Security Intelligence for Retail Organizations by Q1 Labs, an IBM Company

February 24, 2012 - (Free Research)
This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management. 
(WEBCAST) READ ABSTRACT |

Holistic risk management: Perspectives for IT professionals by IBM

October 16, 2012 - (Free Research)
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives. 
(WHITE PAPER) READ ABSTRACT |

Delivering Success that Scales with the Largest Enterprises by IBM

March 07, 2013 - (Free Research)
Today, businesses need to manage high data volumes and eliminate the complexity that comes along with it. View this resource to learn more about the factors associated with first-generation security information and event management (SIEM) solutions. 
(WHITE PAPER) READ ABSTRACT |

Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation by Thawte Inc.

January 29, 2014 - (Free Research)
In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections. 
(EGUIDE) READ ABSTRACT |

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 22, 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Cloud Risk Framework by ComputerWeekly.com

June 01, 2012 - (Free Research)
This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

Strengthening Enterprise Security through Notebook Encryption by Intel Corporation

December 2008 - (Free Research)
Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner. 
(WHITE PAPER)

Niksun NetDetector Data Sheet by NIKSUN

NetDetector seamlessly integrates with other NIKSUN products, 3rd-party applications and network devices to provide a rock-solid security solution. 
(HARDWARE PRODUCT)

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Understanding Risk: An Opportunity for IT Managers by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Understanding Risk: An Opportunity for IT Managers” outlines the results of an IBM Global Risk Study that was commissioned to understand how IT managers are working to understand and mitigate risk. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The evolving roles of IT Managers and CIOs. Findings from the 2010 Global IT Risk Study by IBM

May 2011 - (Free Research)
This overview of the 2010 IBM Global IT Risk Study uncovers the challenges associated with IT risk, and the steps IT managers and CIOs are taking to better understand, confront and resolve this concern. 
(WHITE PAPER) READ ABSTRACT |

Mitigating Risk and Ensuring Compliance with EMC Documentum ApplicationXtender Retention Manager by EMC Corporation

August 2010 - (Free Research)
Read this white paper to learn how to easily configure document retention and disposition policies in the background to mitigate risk and meet compliance goals. 
(WHITE PAPER) READ ABSTRACT |

Backup and Recovery with Oracle’s Sun ZFS Storage Appliances and Oracle Recovery Manager by Oracle Corporation

February 2011 - (Free Research)
Oracle Recovery Manager is the preferred backup solution for Oracle database environments and is engineered to work together with Oracle’s Sun ZFS Storage Appliances to meet today's challenging backup requirements. Advantages of Sun ZFS Storage Appliances include; simplicity, speed, savings, and reduced risk. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management - Methods and tools by SearchSecurity.com & SearchCompliance.com

May 2009 - (Free Research)
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business. 
(EBOOK) READ ABSTRACT |

From Development to Production: Streamlining SharePoint Deployment with DocAve® Deployment Manager by AvePoint, Inc.

June 2009 - (Free Research)
This document examines the capabilities of DocAve Deployment Manager and offers tips and guidance to help streamline the SharePoint deployment process while maintaining the integrity of all SharePoint staging instances. 
(WHITE PAPER) READ ABSTRACT |

From Development to Production: Streamlining SharePoint Deployment with DocAve® Deployment Manager by AvePoint, Inc.

March 2009 - (Free Research)
This document examines the capabilities of DocAve Deployment Manager and offers tips and guidance to help streamline the SharePoint deployment process while maintaining the integrity of all SharePoint staging instances. 
(WHITE PAPER) READ ABSTRACT |

FlexNet Manager Suite for Enterprises: Complete Desktop-to-Datacenter Enterprise License Optimization Solution by Flexera Software

March 2011 - (Free Research)
Lacking a strategic solution for Enterprise License Optimization most organizations are greatly overspending on some licenses and out of compliance on others, putting them at risk of costly software license audits. FlexNet Manager Suite is a comprehensive and proven solution for Enterprise License Optimization and license compliance management. 
(WHITE PAPER) READ ABSTRACT |

The Agile Project Manager by VersionOne Inc.

June 2009 - (Free Research)
This white paper will explore the impact agile development methodologies are having on the Project Management community, what new skills are required, and what the Project Manager can do to ease the transition. 
(WHITE PAPER) READ ABSTRACT |

Preparation by Automation: Reducing the Cost, Pain, Time, and Risk of IT Security Audits by TraceSecurity

March 2008 - (Free Research)
This white paper explains how IT organizations can use automation to better prepare themselves for IT security audits, thereby significantly reducing the cost, pain, time, and risk associated with them. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security: What Senior Managers Should Know by Sophos, Inc.

October 2012 - (Free Research)
In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success. 
(WHITE PAPER) READ ABSTRACT |

Simplify Compliance and Security with Novell® SentinelT Log Manager by Novell, Inc.

May 2011 - (Free Research)
Finding a log management solution that can manage risk, simplify regulatory compliance and provide security for you network can be very difficult. There are many systems that contain some of these tools but now there is a system that can do all of this. 
(WHITE PAPER) READ ABSTRACT |

Simplify Compliance and Security with Novell® Sentinel™ Log Manager by Novell, Inc.

March 2011 - (Free Research)
Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts