White Papers Risk Assessment MicrosoftWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Papers Risk Assessment Microsoft returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Endpoint Security
 •   Application Security
 •   Security Policies
 •   Enterprise Systems Management
 •   Application Management and Maintenance
 •   Business Process Management (BPM)

Related Searches
 •   Benefits White Papers
 •   Graphics White Papers
 •   Info About White
 •   Pay White Papers
 •   Webcast White
 •   White Importing
 •   White Monitoring
 •   White Outsource
 •   White Script
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

IT Executive Guide to Security Intelligence by IBM

February 24, 2011 - (Free Research)
In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 19, 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Cloud computing fundamentals by IBM

December 17, 2010 - (Free Research)
Cloud computing offers businesses a whole new way to deliver high quality services to end users and as a result, introduces many opportunities for revenue growth. This white paper provides detailed insights on cloud computing and how you can leverage it in your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Transitioning from Log Management and SIEM to Security Intelligence by IBM

January 01, 2013 - (Free Research)
Learn how security intelligence empowers organizations to maintain comprehensive and cost-effective threat prevention and risk aversion. 
(WHITE PAPER) READ ABSTRACT |

Software Quality Optimization: Business Transformation and Risk by IBM

March 10, 2009 - (Free Research)
Information technology is undergoing constant innovation. To keep pace, software development organizations need to release business-critical software in less time, but this increases risk and often results in compromised quality. So the question becomes: How can you save time and reduce costs without sacrificing quality? Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Security intelligence is the smart way to keep the cloud safe by IBM

October 31, 2013 - (Free Research)
This white paper will examine the intelligence capabilities necessary for gaining visibility into, and control over, cloud security. It also demonstrates how an integrated suite of end-to-end security intelligence solutions can help meet cloud security needs. 
(WHITE PAPER) READ ABSTRACT |

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension

January 27, 2010 - (Free Research)
Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Risk-Free Storage for VDI by Nimble Storage

December 31, 2012 - (Free Research)
Learn how hybrid storage delivers VDI performance, integrated data protection, and instant backups and restores—all for dramatically lower cost. 
(WHITE PAPER) READ ABSTRACT |

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects by HCL Technologies Ltd.

June 2008 - (Free Research)
This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool. 
(WHITE PAPER) READ ABSTRACT |

Supporting information technology risk management by IBM

October 2011 - (Free Research)
Access the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions. 
(WHITE PAPER) READ ABSTRACT |

IBM X-Force 2011 Trend and Risk Report CIO Security Priorities by IBM

September 2012 - (Free Research)
Consult this informative white paper to learn more about the attack trends in 2011 including external network and security breaches. Discover key ways to prevent leaked customer data and inaccessible web services by analyzing the risks before it's too late. 
(WHITE PAPER) READ ABSTRACT |

Protect citizen data with IBM Rational software by IBM

July 2012 - (Free Research)
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data. 
(WHITE PAPER) READ ABSTRACT |

The Right Tool for the Right Job: An Application Security Tools Report Card by IBM

August 2010 - (Free Research)
This white paper examines the most common tools found in the enterprise application security environment. 
(WHITE PAPER) READ ABSTRACT |

Vulnerability Assessment by Symantec Corporation

October 2013 - (Free Research)
Access this white paper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to unveil an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense. 
(WHITE PAPER) READ ABSTRACT |

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation by IBM

October 2013 - (Free Research)
Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks. 
(WHITE PAPER) READ ABSTRACT |

Take a Holistic Approach to Business-Driven Security by IBM

March 2008 - (Free Research)
This paper introduces actions that organizations can take to drive security efforts from a business and operational perspective and discusses how security leadership from IBM can help enable their success. 
(WHITE PAPER) READ ABSTRACT |

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment by IBM

October 2013 - (Free Research)
This guide discusses security leaders' top concerns with today's aggressive threat landscape. 
(WHITE PAPER) READ ABSTRACT |

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment by IBM

October 2013 - (Free Research)
This guide discusses security leaders' top concerns with today's aggressive threat landscape. 
(WHITE PAPER) READ ABSTRACT |

IBM Security Intrusion Preventions Solutions by IBM

December 2012 - (Free Research)
Read this white paper to learn how to get industry-leading performance, preemptive threat protection, high levels of availability, and simplified deployment and management for networks. 
(WHITE PAPER) READ ABSTRACT |

3 Key Components of a Risk-Based Security Plan by Foundstone, Inc.

June 2008 - (Free Research)
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan. 
(WHITE PAPER) READ ABSTRACT |

IBM Cognos Learning Assessment by IBM

March 2009 - (Free Research)
This white paper introduces a customized learning assessment work package that extends the value of one business intelligence and performance management platform by teaching your business users the skills they need to drive success. 
(WHITE PAPER) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

The 10 Most Dangerous Risks to Microsoft Security by Global Knowledge

May 2009 - (Free Research)
Security has always been an important part of any IT infrastructure. This white paper has tips to help improve your awareness of some of the more important risks threatening your Microsoft infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Secure Enterprise e-mail Solutions with Microsoft® Exchange by Agilysys-Sun Technology Solutions

July 1967 - (Free Research)
This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies. 
(WHITE PAPER) READ ABSTRACT |

Making Mobility Matter in Healthcare Data Security by Dell, Inc.

June 2012 - (Free Research)
This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place. 
(WHITE PAPER)

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts