Technology RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Technology Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Vulnerability Assessment
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Intrusion Detection/ Forensics
 •   Materials Compliance Management Solutions
 •   Treasury / Cash / Risk Management

Related Searches
 •   Net Technology
 •   Operate Technology Risk
 •   Patent Technology Risk
 •   Samples Technology Risk
 •   Technology Applications
 •   Technology Risk Benefit
 •   Technology Risk North Carolina
 •   Technology Risk Plan
 •   Technology Risk Productivity
 •   View Technology
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Supporting information technology risk management by IBM

October 01, 2011 - (Free Research)
Access the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions. 
(WHITE PAPER) READ ABSTRACT |

Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC

August 31, 2010 - (Free Research)
Faced with some of the greatest challenges in history, companies are focusing on cutting costs and more stringent fiscal management. Regardless of industry, organizations are reassessing investment budgets, reducing staff and implementing other measures to reduce operational expenses across all business disciplines. 
(WHITE PAPER) READ ABSTRACT |

The Connection Imperative: How to Realize Your Cloud Potential by SnapLogic

January 29, 2014 - (Free Research)
A major challenge for modern organizations is successfully managing the technology risks of delivering real-time data. Access this informative paper today to learn how to properly manage consistent integration struggles and better understand the importance of integrating data both in the cloud and on the ground. 
(WHITE PAPER) READ ABSTRACT |

No Blind Spots in Perimeter Security with Security Event Information Management by Radware

October 10, 2011 - (Free Research)
Security Event Information Management (SEIM) can provide the security leap-frog in a world of point solutions – to ensure there are no blind spots in your network security architecture. 
(WHITE PAPER) READ ABSTRACT |

eBook: Compliance for the Midmarket: Governance, Risk and Technology by SearchCIO.com

June 09, 2009 - (Free Research)
Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ 
(EBOOK) READ ABSTRACT |

Protect citizen data with IBM Rational software by IBM

July 24, 2012 - (Free Research)
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data. 
(WHITE PAPER) READ ABSTRACT |

The Essentials Series: Security Information Management by SecureWorks

October 09, 2009 - (Free Research)
This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation. 
(WHITE PAPER) READ ABSTRACT |

Ponemon Global Study on Mobility Risks by Websense, Inc.

February 01, 2012 - (Free Research)
With the proliferation of mobile devices only progressing, it’s important fully to understand this trend to know how to build a robust security strategy to mitigate risks. This resource uncovers key findings based on a survey of 4,640 IT pros, exploring the major security issues of mobility and what they are doing to effectively address them. 
(WHITE PAPER) READ ABSTRACT |

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC

March 27, 2012 - (Free Research)
This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy. 
(WHITE PAPER) READ ABSTRACT |

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC

December 02, 2010 - (Free Research)
As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands. 
(WHITE PAPER) READ ABSTRACT |

Critical Technologies for Compliance & Risk Management for Medical Device Companies by Siperian, Inc.

February 20, 2009 - (Free Research)
Building the foundation for a sound master data management program is critical to the success of any compliance effort. The ten requirements in this paper will enable you to identify a suitable technology platform - a prerequisite when managing your organization's master data assets & critical to establishing a consistent master data foundation. 
(WHITE PAPER) READ ABSTRACT |

Critical Technologies for Compliance and Risk Management by Siperian, Inc.

February 20, 2009 - (Free Research)
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines. 
(WHITE PAPER) READ ABSTRACT |

Mitigating Supply Chain Risk Using Collaborative Technology by Infinity QS

May 2007 - (Free Research)
This whitepaper addresses the trends surrounding Supply Chain Risk Management (SCRM) and the strategies that manufacturers are using to mitigate risk from their supply network. It contains a case study about how one manufacturer is viewing real-tim... 
(WHITE PAPER) READ ABSTRACT |

Safeguard the Implementation of New Technology: Reduce Implementation Risk and Optimize Performance by SAP America, Inc.

September 2010 - (Free Research)
Organizations have increasingly complex software, interface, and IT landscapes. This paper explains how the SAP Safeguarding for Integration Validation portfolio of services offers the process, tools, and expertise you need to reduce the technical risk and cost associated with implementing new software solutions. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in the Cloud by NetApp

October 2009 - (Free Research)
This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 21 January 2014: The IT risks facing Universal Credit by ComputerWeekly.com

January 2014 - (Free Research)
In this week's Computer Weekly, we examine the ongoing IT risks facing the UK government's highest-profile IT project – the troubled Universal Credit programme. We talk to IT leaders to find out their spending priorities for 2014. And we find out about the latest best practice in improving datacenter performance. Read the issue now. 
(EZINE) READ ABSTRACT |

HP Fundamentals: Decreasing IT Risk in the age of cloud, big data, and virtualization by Hewlett-Packard Company

April 2014 - (Free Research)
Watch this informative webcast to discover how you can lower the risk of adopting more complex IT innovations, such as cloud and virtualization, so your organization can reap the benefits of such technologies without sacrificing security. 
(WEBCAST) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in an Active Directory Integrated Virtualized Environment by Dell Software

February 2014 - (Free Research)
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in an Active Directory Integrated Virtualized Environment by Imperva

February 2014 - (Free Research)
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk Management and Compliance (GRC) by ComputerWeekly.com

February 2014 - (Free Research)
Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. 
(ANALYST REPORT) READ ABSTRACT |

CW Buyers Guide To Finance and Insurance by ComputerWeekly.com

February 2014 - (Free Research)
This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Information Risk: Managing Digital Assets in a new Technology Landscape by Hewlett-Packard Limited

February 2014 - (Free Research)
This in-depth report outlines the current threat landscape, different types of risks, and what you can do to prevent devastating cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts