Whitepaper RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Whitepaper Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Monitoring
 •   Disk-based Backup & Storage/ RAID
 •   Mobile Device Management
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Treasury / Cash / Risk Management

Related Searches
 •   Active Whitepaper
 •   Balancing Whitepaper
 •   Parts Of Whitepaper Risk
 •   Whitepaper Case
 •   Whitepaper Risk Proposal
 •   Whitepaper Risk Reviews
 •   Whitepaper Risk Scripts
 •   Whitepaper Risk Standard
 •   Whitepaper Risk Warehouse
 •   Whitepaper Top
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Mobile Device Management Systems Help Mitigate BYOD Risks by SearchSecurity.com

March 12, 2013 - (Free Research)
This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics. 
(EGUIDE) READ ABSTRACT |

Delivering Enterprise Value with Oracle Governance, Risk & Compliance by Oracle Corporation

October 01, 2010 - (Free Research)
In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension

October 06, 2009 - (Free Research)
This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Mitigating Supply Chain Risk Using Collaborative Technology by Infinity QS

May 2007 - (Free Research)
This whitepaper addresses the trends surrounding Supply Chain Risk Management (SCRM) and the strategies that manufacturers are using to mitigate risk from their supply network. It contains a case study about how one manufacturer is viewing real-tim... 
(WHITE PAPER) READ ABSTRACT |

Reducing Risk with Scale-out NAS for Large-scale Virtualization by Isilon Systems

May 2011 - (Free Research)
This whitepaper uncovers the most common storage management challenges associated with server virtualization - and how scale-out storage solutions can help you overcome these challenges. Check out this GlassHouse whitepaper to see how your organization can unlock the true potential of server virtualization with scale-out storage. 
(WHITE PAPER) READ ABSTRACT |

Risk Never Sleeps: Managing Risk in an Uncertain World by SunGard Alternative Investments

August 2010 - (Free Research)
IT professionals are increasingly responsible for doing more than just provisioning servers and maintaining applications – they are core players in the risk management process. Read this whitepaper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Considerations for Integrating Intelligence into Security Operations by VeriSign EMEA

December 2009 - (Free Research)
This whitepaper outlines four critical elements of cyber security intelligence that organizations must meet to ensure that the integration of the intelligence will help improve the safety and profitability of enterprises. This paper also presents specific questions to ask when determining the best approach for an overall risk-mitigation strategy. 
(WHITE PAPER) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 2014 - (Free Research)
This informative whitepaper takes a look current threat landscape and what you need to do to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Managing data and application security risks cost effectively by IBM

October 2009 - (Free Research)
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit. 
(WHITE PAPER) READ ABSTRACT |

Software Quality Optimization: Business Transformation and Risk by IBM

March 2009 - (Free Research)
Information technology is undergoing constant innovation. To keep pace, software development organizations need to release business-critical software in less time, but this increases risk and often results in compromised quality. So the question becomes: How can you save time and reduce costs without sacrificing quality? Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Smart Strategies for Securing Extranet Access by Oracle Corporation

March 2010 - (Free Research)
Download this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies. 
(WHITE PAPER) READ ABSTRACT |

Accelerating Incident Response and Reducing Security Risks by Dell SecureWorks UK

April 2014 - (Free Research)
This essential whitepaper outlines the advantages of managed security services providers and how your incident response strategy is essential to your overall security plan. 
(WHITE PAPER) READ ABSTRACT |

Gorillas on Your List – A Diversified OEM Environment Can Lower Your Risk by Dimension Data

January 2014 - (Free Research)
This informative whitepaper covers the value of breaking free from a single original equipment manufacturer and diversifying the commodities in your data center. 
(WHITE PAPER) READ ABSTRACT |

Enabling Enterprise 2.0 by Websense, Inc.

August 2009 - (Free Research)
Read this whitepaper to learn ways that organizations can create a strategy that embraces Web 2.0 technologies securely and enables a successful transition to Enterprise 2.0. 
(WHITE PAPER) READ ABSTRACT |

Electronically Stored Information (ESI) Risk Management Part I - Best Practices by Renew Data Corp.

March 2008 - (Free Research)
It is important for IT and Legal agree on how litigation requirements impact corporate information systems. This paper focuses on the requirements placed on IT and discusses solutions for proactively managing electronically stored information. 
(WHITE PAPER) READ ABSTRACT |

Video Whitepaper: Managing Risk & Uncertainty by Oracle Corporation

November 2009 - (Free Research)
View this video white paper to learn how Integrated business planning can help your company align strategic, operational, and financial plans. 
(VIDEO) READ ABSTRACT |

Pay millions of dollars or risk getting hacked? It’s not too late to migrate by AppSense

July 2013 - (Free Research)
Read this whitepaper to learn how virtualization solutions can help you do away with the risks on Windows XP and make migration of user settings, data, and more to Windows 7 easy. 
(WHITE PAPER) READ ABSTRACT |

Strategy Guide to Business Risk Mitigation for Healthcare by HP & Intel®

March 2011 - (Free Research)
This whitepaper is a rich media document, and includes IDC Analyst Research, multimedia content, risk assessment tool, solutions brief and up to 3 detailed customer case studies, all embedded within this single dossier. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Empowering Information Security with Desktop Virtualization by Citrix

November 2013 - (Free Research)
This whitepaper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth. 
(WHITE PAPER) READ ABSTRACT |

Getting Started with Business Process Management by SoftwareAG Inc., USA

February 2009 - (Free Research)
In this whitepaper, you will learn about the different entry points for BPM, ways of ramping up process initiatives, organizational and cultural challenges that BPM practitioners face, and the critical success factors for BPM. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Successfully Managing Programs and Risk in the Aerospace and Defense Industry by Oracle Corporation

February 2010 - (Free Research)
Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges. 
(WHITE PAPER) READ ABSTRACT |

Strategy for Securing Mobile Content - 5 Key Guidelines by Accellion, Inc.

June 2013 - (Free Research)
Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts