ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • Gartner Security & Risk Management Summit 2015: Schedules, Speakers, and More

    Sponsored by: Gartner

    Access the following brochure to learn about the various topics, schedules, and strategies that will be covered during this year's Gartner Security and Risk Management Summit. Read on to learn will be speaking, future technology predictions, and more.

  • 2015 Cost of Data Breach Study: Global Analysis

    Sponsored by: IBM

    This white paper provides the full details on the 2015 global data breach study, and shows you how to adequately protect your data. Read on to learn more about why the costs of data breaches have increased, and how you can respond immediately in the event of a breach.

  • Raising Your Google Ranking: A Guide

    Sponsored by: Symantec Corporation

    To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.

  • Bolster Your Web Application Security

    Sponsored by: White Hat Security

    This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.

  • A Regional Hospital Stays HIPAA Compliant through On-Demand Vulnerability Assessments

    Sponsored by: BAE Systems Applied Intelligence (formerly SilverSky)

    This white paper details how one hospital was able to easily comply with HIPAA regulations and keep its data safe with continuous vulnerability assessments. Read on to find out how you can effectively protect your data while simplifying management so you can focus on other critical business.

  • Information governance in a big data world

    Sponsored by: IBM

    With big data analytics and the influx of information streaming into your organization, your data governance approach will either unify people, processes, and technology – or tear them apart. Access this white paper and discover the key to creating a holistic governance framework that supports your business objectives and revenue goals.

  • Don’t Let Your DDoS Defense Fall Behind

    Sponsored by: Neustar®

    This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.

  • Top Things to Know for Windows Server 2003 End-Of-Life

    Sponsored by: Lenovo and Intel

    In this e-guide, learn top tips to help secure the Windows Server 2003 upgrade. In addition, discover why many 2003 users are skipping out on Server 2008, and find out how the cloud plays a role in this transition.

  • Managing Multi-Vendor UC Ecosystems

    Sponsored by: IR

    This video introduces IR Prognosis, which identifies issues, reduces MTTR, and manages multi-vendor UC ecosystems, including Microsoft, VMware, Avaya, Cisco, and Alcatel-Lucent. Watch now so you can monitor, measure, and manage the user's complete UC experience and take control of your UC environment.

  • Securing the Mobile-First Experience

    Sponsored by: HID

    This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.

  • Uncover Advanced Attacks and Detect Hidden Breaches

    Sponsored by: Hewlett-Packard Limited

    In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.

  • A New Security Strategy: Focusing on Risk

    Sponsored by: Clearswift

    This white paper explores how to shift your security strategy from a compliance-based model to a risk-based model to protect strategic assets. Continue reading and discover how to improve your overall security strategy by implementing a security training and awareness program.

  • The Cloud at Your Pace

    Sponsored by: Rackspace

    Access this white paper for the 8 top cloud concerns and learn how you can address them, while minimizing your risks, and moving to the cloud at your own pace.

  • Mitigating Legal and Business Risks of Cyber Breaches

    Sponsored by: UnitedLex

    In this webcast, a panel of experts discusses real case studies illuminating how legal and IT can collaborate to mitigate the business and legal liabilities of a cyber-breach.

  • Business Risk: Effective Technology Protecting Your business

    Sponsored by: Hewlett-Packard Limited

    Consult the following white paper to learn how to improve your business protection and risk mitigation by applying automation to repetitive tasks. Read on to discover how you can use the approach provided in this paper to reduce downtime cost by 30-60% and reduce lost productivity by 80%.

  • Faster Speed-to-Market Through Secure Information Sharing

    Sponsored by: IntraLinks, Inc

    This case study explores how to securely manage file systems and reduce complexity. Read on now to learn how to simplify data sharing with partners without the risk of data loss.

  • Why Legal and Compliance Staff Need to Tune in to Cyber Risk Management

    Sponsored by: UnitedLex

    Access this white paper to learn why a unified or converged approach to threat management is necessary to effectively fight cyber attackers and prevent costly data breaches.

  • 2014 Cost of Cyber Crime Study

    Sponsored by: Hewlett-Packard Limited

    If you want to avoid the costs of cybercrime, you need to know what you're up against. This resource can help.

  • It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches

    Sponsored by: UnitedLex

    This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.

  • Governance rules to navigate data mobility and velocity complexities

    Sponsored by: SearchCompliance.com

    Mobile devices have become the Internet's dominant user interface, complicating GRC strategy for many companies. In this classroom, learn governance strategies to remain regulatory compliant as digital assets are increasingly available to users anywhere, at any time.

  • Business risks of software vulnerabilities

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.

  • 3 Step Guide for IT Governance & Compliance

    Sponsored by: Dell Software

    This white paper details the three critical steps for maintaining compliance with external regulations and internal security policies. Read on to learn the four key external regulations to consider when preparing an IT compliance audit. Read on to learn more.

  • Global Risks Report 2015

    Sponsored by: ComputerWeekly.com

    The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.

  • Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack

    Sponsored by: Cisco

    This important white paper explores a security solution that spans the entire attack continuum.

  • Key Considerations in Moving to Microsoft Office 365

    Sponsored by: Mimecast

    This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.