White Paper Risk AssessmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Paper Risk Assessment returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Data Security
 •   Treasury / Cash / Risk Management
 •   Application Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Endpoint Security
 •   Managed Security Services
 •   Application Management and Maintenance

Related Searches
 •   Cycle White
 •   Cycles White Paper Risk
 •   Delivery White Paper
 •   Measures White Paper
 •   Performance White Paper Risk
 •   Pro White Paper Risk
 •   Project White
 •   Protocol White Paper Risk
 •   White Advantages
 •   White Paper Risk Diagram
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

2013 RSA Archer GRC Summit: Key Findings by RSA, The Security Division of EMC

September 30, 2013 - (Free Research)
View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Risk-Free Storage for VDI by Nimble Storage

December 31, 2012 - (Free Research)
Learn how hybrid storage delivers VDI performance, integrated data protection, and instant backups and restores—all for dramatically lower cost. 
(WHITE PAPER) READ ABSTRACT |

Improving the Reliability and Performance of SAP Software: Creating a Road Map with Testing Strategy Assessment by SAP America, Inc.

July 28, 2011 - (Free Research)
Read this white paper to discover a full portfolio of testing tools designed to easily integrate powerful application testing into your development lifecycle. Continue reading to learn how these tools can help lower risk, reduce costs and boost efficiency. 
(WHITE PAPER) READ ABSTRACT |

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects by HCL Technologies Ltd.

June 2008 - (Free Research)
This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Data Management by SAS

March 2008 - (Free Research)
The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM. 
(WHITE PAPER) READ ABSTRACT |

The Cybercrime Arms Race by Kaspersky Lab

February 2008 - (Free Research)
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them. 
(WHITE PAPER) READ ABSTRACT |

Vulnerability Assessment by Symantec Corporation

October 2013 - (Free Research)
Access this white paper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to unveil an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense. 
(WHITE PAPER) READ ABSTRACT |

 Safer web browsing in four steps by Sophos, Inc.

October 2010 - (Free Research)
Accessing the web poses enormous risks, yet you can’t afford to be isolated from the internet and its resources. This white paper examines the latest web threats, and recommends four best practices and a layered approach that enables your users while also protecting your organization’s endpoints, network and data. 
(WHITE PAPER) READ ABSTRACT |

All Qualified Security Assessors Are Not Created Equal by AT&T Corp

August 2010 - (Free Research)
The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment 
(WHITE PAPER)

IT Executive Guide to Security Intelligence by IBM

February 2011 - (Free Research)
In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security. 
(WHITE PAPER) READ ABSTRACT |

3 Key Components of a Risk-Based Security Plan by Foundstone, Inc.

June 2008 - (Free Research)
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan. 
(WHITE PAPER) READ ABSTRACT |

Making Mobility Matter in Healthcare Data Security by Dell, Inc.

June 2012 - (Free Research)
This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place. 
(WHITE PAPER)

Enterprise Report Management: A Market Assessment by IBM

September 2008 - (Free Research)
This white paper from AIIM International is based on findings from a recent survey conducted by AIIM on enterprise report management (ERM). 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Secure File Transfer in the Era of Compliance by Ipswitch WhatsUp Gold

July 2007 - (Free Research)
Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information. 
(WHITE PAPER) READ ABSTRACT |

Location, Location, Location! Best Practices for Selecting Onshore, Nearshore or Offshore Technology Services by Fairway Technologies, Inc.

November 2010 - (Free Research)
This white paper provides an overview of ITO, presents benefit and risk assessments of onshore, nearshore and offshore ITO, and offers best practices to assist in selecting an ITO provider. This paper is based on research compiled from published literature as well as interviews and surveys of technology professionals possessing ITO experience. 
(WHITE PAPER) READ ABSTRACT |

Improving the Reliability and Performance of SAP Software: Creating a Road Map with Testing Strategy Assessment by Riverbed Technology, Inc.

July 2011 - (Free Research)
Read this white paper to discover a full portfolio of testing tools designed to easily integrate powerful application testing into your development lifecycle. Continue reading to learn how these tools can help lower risk, reduce costs and boost efficiency. 
(WHITE PAPER) READ ABSTRACT |

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World by CommVault Systems, Inc.

April 2014 - (Free Research)
This white paper explains how a GRC platform can transform how an organization operates – internally, externally and legally. It explains how a suitable platform enables better, faster decision making, creating a more competitive organization. 
(WHITE PAPER) READ ABSTRACT |

Hitting the Moving Target of Operational Excellence: Identifying and Obtaining the Information Needed for Continued Success by SAP America, Inc.

May 2007 - (Free Research)
This white paper presents IDC’s framework for implementing operational excellence (opex) and helps the reader move toward an effective op ex implementation while avoiding potential pitfalls. 
(WHITE PAPER) READ ABSTRACT |

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk by Pitney Bowes Group 1 Software

April 2008 - (Free Research)
What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates. 
(WHITE PAPER) READ ABSTRACT |

IBM X-Force 2011 Trend and Risk Report CIO Security Priorities by IBM

September 2012 - (Free Research)
Consult this informative white paper to learn more about the attack trends in 2011 including external network and security breaches. Discover key ways to prevent leaked customer data and inaccessible web services by analyzing the risks before it's too late. 
(WHITE PAPER) READ ABSTRACT |

Software Quality Optimization: Business Transformation and Risk by IBM

March 2009 - (Free Research)
Information technology is undergoing constant innovation. To keep pace, software development organizations need to release business-critical software in less time, but this increases risk and often results in compromised quality. So the question becomes: How can you save time and reduce costs without sacrificing quality? Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension

January 2010 - (Free Research)
Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment. 
(WHITE PAPER) READ ABSTRACT |

Malware Security Report: Protecting Your Business, Customers and Bottom Line by VeriSign Australia

August 2010 - (Free Research)
This white paper will help you understand the threats from Malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect them. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

November 2010 - (Free Research)
This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts