Risks applicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risks application returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Treasury / Cash / Risk Management
 •   Security Monitoring
 •   Data Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Business Process Management (BPM)
 •   Vulnerability Assessment
 •   Application Management and Maintenance

Related Searches
 •   Basics Of Risks application
 •   Learn About Risks application
 •   Risks Agency
 •   Risks application Arkansas
 •   Risks application Guideline
 •   Risks application Managers
 •   Risks application Resources
 •   Schedules Risks
 •   Screen Risks application
 •   Webinars Risks application
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Controlling Risk Through Software Code Governance by Coverity

July 26, 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Reducing Risk through Requirements-driven Quality Management: An End-to-end Approach by Hewlett-Packard Company

December 23, 2008 - (Free Research)
This white paper explains a structured way to manage requirements and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system. 
(WHITE PAPER) READ ABSTRACT |

The Application Usage and Risk Report by Palo Alto Networks

June 30, 2010 - (Free Research)
The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 11, 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

Understanding the risks of mobile apps by Veracode, Inc.

May 11, 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

The Mobile App Top 10 Risks by Veracode, Inc.

February 15, 2011 - (Free Research)
This expert webcast reveals the top 10 mobile application risks facing organizations today. 
(WEBCAST) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Software Quality Optimization: Business Transformation and Risk by IBM

March 10, 2009 - (Free Research)
Information technology is undergoing constant innovation. To keep pace, software development organizations need to release business-critical software in less time, but this increases risk and often results in compromised quality. So the question becomes: How can you save time and reduce costs without sacrificing quality? Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance by Oracle Corporation

May 11, 2011 - (Free Research)
When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Value with Oracle Governance, Risk & Compliance by Oracle Corporation

October 01, 2010 - (Free Research)
In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients. 
(WHITE PAPER) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 23, 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 01, 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

Delivering high quality applications faster with reduced risk & cost by IBM

September 02, 2011 - (Free Research)
Improve time to value and quality by reducing rework and cost through faster stakeholder consensus, increased productivity, better process automation, and anytime-anywhere decision support for application software. Download the paper for more information on delivering high quality applications faster with reduced risk & cost. 
(WHITE PAPER) READ ABSTRACT |

How to Beat the Cost of Compliance by Optimizing your Data Across its Lifecycle with IBM System z® by IBM

March 01, 2011 - (Free Research)
In this webcast you’ll learn how to lower costs through optimizing your organization’s data, thereby improving the efficiency of your business processes and applications. With intelligent archiving and thorough backup-and-restore strategies, you can further reduce costs and risks to your business. 
(WEBCAST)

Harnessing Oracle Governance, Risk, and Compliance Applications to Improve Your PeopleSoft 9.1 Upgrade by Oracle Corporation

July 01, 2010 - (Free Research)
This paper explains how the Oracle Governance, Risk, and Compliance (GRC) applications suite may be leveraged to streamline your upgrade to PeopleSoft 9.1, while building an enterprise GRC platform that helps realize operating efficiencies, transparency, and sustainable compliance and risk management well into the future. 
(WHITE PAPER) READ ABSTRACT |

GRC Solutions from itelligence: Balance Risk And Opportunity With A Practical Approach to GRC by itelligence, Inc.

May 15, 2013 - (Free Research)
To keep pace in today's constantly evolving regulatory environment, you need a comprehensive governance, risk, and compliance (GRC) system. This brief white paper highlights how the right GRC strategy can help you standardize business process and increase control over compliance issues. 
(WHITE PAPER) READ ABSTRACT |

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 23, 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

E-Guide: VM in the Cloud by SearchSecurity.com

January 31, 2012 - (Free Research)
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more. 
(EGUIDE) READ ABSTRACT |

Mobile Device Management Systems Help Mitigate BYOD Risks by SearchSecurity.com

March 12, 2013 - (Free Research)
This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics. 
(EGUIDE) READ ABSTRACT |

As data grows, so do the risks: How to improve data and app sec by IBM

September 30, 2012 - (Free Research)
Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: March 2009 - Sky-High Risk? by Information Security Magazine

March 20, 2009 - (Free Research)
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more. 
(EZINE)

E-Book: Technical Guide on Application Security: Scanning Production Applications by IBM

December 07, 2010 - (Free Research)
This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications. 
(EBOOK) READ ABSTRACT |

Harnessing Oracle Governance, Risk, and Compliance Applications to Improve Your E-Business Suite 12.1 Upgrade by Oracle Corporation

July 01, 2010 - (Free Research)
This video white paper explains how continued use of the Oracle GRC applications suite embeds deep-seated controls within EBS Release 12.1 so business processes are kept intact and optimized long after the upgrade project is complete.  
(WHITE PAPER) READ ABSTRACT |

Reduce risk of applicationfailures: HP Testing and QA Services At A Glance by Hewlett-Packard Company

October 08, 2013 - (Free Research)
View this resource to learn more about how you can deliver quality management and testing services to eliminate waste in the systems engineering process and reduce the risk of system outages from software failures. 
(WHITE PAPER) READ ABSTRACT |

3 Strategies to Protect Endpoints from Risky Applications by Lumension

September 10, 2010 - (Free Research)
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts