Technical Risk AssessmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Technical Risk Assessment returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Security Monitoring
 •   Security Policies
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Treasury / Cash / Risk Management
 •   Network Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Automated Security Auditing/ Source Code Analysis

Related Searches
 •   Internet Technical Risk
 •   Papers Technical
 •   Review Technical
 •   Strategies Technical Risk Assessment
 •   Technical Michigan
 •   Technical Multi
 •   Technical Paper
 •   Technical Risk Assessment Developments
 •   Technical Risk Assessment Documents
 •   Technical Risk Owning
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Safeguard the Implementation of New Technology: Reduce Implementation Risk and Optimize Performance by SAP America, Inc.

September 20, 2010 - (Free Research)
Organizations have increasingly complex software, interface, and IT landscapes. This paper explains how the SAP Safeguarding for Integration Validation portfolio of services offers the process, tools, and expertise you need to reduce the technical risk and cost associated with implementing new software solutions. 
(WHITE PAPER) READ ABSTRACT |

The Demise in Effectiveness of Signature and Heuristic Based Antivirus by ComputerWeekly.com

February 18, 2013 - (Free Research)
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Managing Engineering Documents an Enterprise Perspective by McLaren Software

February 2008 - (Free Research)
This document summarizes the implementation options of a document management solution and provides an overview of how McLaren Software's Enterprise Engineer application suite can help solve these issues. 
(WHITE PAPER) READ ABSTRACT |

Discovering Vulnerable Web Applications by Qualys

August 2012 - (Free Research)
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: DR Checklist: Tailoring your Plan to your Organization's Needs by FalconStor Software

May 2012 - (Free Research)
This E-Guide is your ticket to establishing a successful disaster recovery and business continuity strategy. 
(EGUIDE) READ ABSTRACT |

2013 RSA Archer GRC Summit: Key Findings by RSA, The Security Division of EMC

September 2013 - (Free Research)
View this white paper for the top findings from last year's  governance, risk, and compliance (GRC) forum to learn what latest trends you should consider for your strategy. 
(WHITE PAPER) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects by HCL Technologies Ltd.

June 2008 - (Free Research)
This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool. 
(WHITE PAPER) READ ABSTRACT |

Setting standards in IT Industries by DLT Solutions

March 2012 - (Free Research)
Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces. 
(EGUIDE) READ ABSTRACT |

E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com

June 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state. 
(EBOOK) READ ABSTRACT |

Network Security Technologies Technical Guide by SearchSecurity.com

December 2012 - (Free Research)
Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more. 
(WHITE PAPER) READ ABSTRACT |

Control Compliance Suite Trialware by Symantec Corporation

April 2009 - (Free Research)
Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial. 
(DOWNLOAD)

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Scanning Production Applications by IBM

December 2010 - (Free Research)
This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications. 
(EBOOK) READ ABSTRACT |

Transitioning to LTE: Business and Technical Considerations by Alcatel-Lucent

November 2010 - (Free Research)
LTE evolution is more than a move to a new technology. It encompasses a shift in the service provider’s business model to a more sustainable and profitable one. Read this presentation transcript to learn more!Trackback URL 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

Endpoint Security Technology by Symantec Corporation

November 2013 - (Free Research)
Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being. 
(EGUIDE) READ ABSTRACT |

Understanding and Selecting a Database Assessment Solution by Application Security, Inc.

February 2010 - (Free Research)
In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment. 
(ANALYST REPORT) READ ABSTRACT |

Virtualization Solutions from Sun Microsystems: I Remember When Being Green Meant Compromise by LEGACY - DO NOT USE - Insight

June 2008 - (Free Research)
For every area of your datacenter, Sun Professional Services has created a tailored assessment service. 
(WHITE PAPER) READ ABSTRACT |

SearchSecurity.com E-Guide: Balancing compliance with information security threat assessment by IBM

September 2011 - (Free Research)
While compliance regulations and standards have improved information security, they have also created unique challenges when it comes to adequately securing the organization. This expert tip offers authoritative, technical advice on how to balance compliance with your information security threat assessment. 
(EGUIDE) READ ABSTRACT |

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

Airspace Risk Assessment by AirTight Networks, Inc.

August 2008 - (Free Research)
This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture. 
(WHITE PAPER) READ ABSTRACT |

ProStor InfiniVault SEC 17a-4(f) Compliance Assessment by ProStor Systems

December 2007 - (Free Research)
Download this white paper to learn how ProStor's InfiniVault data archiving system complies with an array of government requirements, which regulate the storage, retrieval and management of electronic records. 
(ARTICLE) READ ABSTRACT |

Open Group technical document: IT Specialist Certification Accreditation Policy by ComputerWeekly.com

October 2010 - (Free Research)
A common characteristic of people-certification programs in the marketplace is that most test or validate the existence of relevant knowledge. Few reach beyond this. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts