ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • How to Use Detection and Response to Reduce Business Risk

    Sponsored by: Dell SecureWorks

    Use this white paper to learn how you can reduce the impact of threats to your organization by leveraging security monitoring systems to improve response times, proactively respond to breaches, and more.

  • Using Compliance as a Leaping Pad: Moving on From the "Opportunistic" Stage

    Sponsored by: Dell SecureWorks

    Explore how enterprises in the 'opportunistic' stage of security management can build upon existing compliance infrastructure. Learn how to use risk management to your advantage, grow the reach of your security systems, and more.

  • Beyond your company boundaries

    Sponsored by: ComputerWeekly.com

    Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.

  • Securing the Evolving Enterprise Network: Inside and Out

    Sponsored by: Aruba Networks

    What is tue current state of network security and how can it be improved? This paper from the Enterprise Strategy Group answers this by surveying current network security needs and the problems causing them, as well as why you should consider "closed-loop" network security.

  • Key Issues for E-Discovery and Legal Compliance

    Sponsored by: Smarsh

    Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with e-discovery issues. In this Osterman Research report, uncover insight from the results of an in-depth survey of decision makers and influencers at mid-sized and large organizations.

  • The Public Sector Guide to Text Messaging Policy and Retention 2017 Edition

    Sponsored by: Smarsh

    This white paper explores how to protect against the risks associated with text messaging by using a cloud-based archiving platform. Learn how to develop a smart text message policy and retention strategy that enables you to respond readily to open records requests or other e-discovery needs.

  • Software Asset Management: Critical for Mitigating Non-Compliance Risks

    Sponsored by: Flexera Software

    This IDC white paper defines software asset management and emphasizes the factors driving its importance. Uncover best practices for mitigating the risks of inefficient software portfolio management and addressing 3 key priorities, namely app security, cost management, and quality of service.

  • How to Drive Business Innovation in Financial Services with a Service-Aware Network

    Sponsored by: Juniper Networks, Inc.

    In an era when customers expect everything instantly, having IT systems that can adapt is critical. But many financial firms have IT infrastructures that are lagging behind. Learn how adopting new technologies like a service-aware network and DevOps can help firms improve performance, lower costs, and more.

  • How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

    Sponsored by: Rapid7

    In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.

  • When Software Goes Rogue

    Sponsored by: BDNA

    How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.

  • Focus: how to avoid being hit by ransomware

    Sponsored by: ComputerWeekly.com

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Reduce the Risks and Costs Associated with Software Assets and Licensing

    Sponsored by: Snow Software

    Organizations around the world spend over an estimated $330 billion on enterprise software every year. Software asset management (SAM) is designed to help you keep track of all your software licensing data, ensure compliance, and prevent overspending. Watch this 2 minute video to see how SAM will save your bottom line.

  • Information Governance: Protect Your Company's Assets

    Sponsored by: Box

    This white paper explores how to leverage the cloud content management platform from Box to implement a sound information governance program for you organization. Discover how to reduce risks and gain control over who can see and use information and how it is kept.

  • Navigating IT Transformation

    Sponsored by: HPE and Intel® Xeon

    IT transformation is the hot new trend, but you've got some hoops to jump through first. This comprehensive IDG paper is here to report on some of the common troubles that your peers are having with their IT transformations and what you can do to avoid these costly mistakes.

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • Your Data on the Move: Taking Back Control of Your Most Precious Asset

    Sponsored by: Globalscape

    This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.

  • Pilot Light DR for Amazon Web Services

    Sponsored by: CloudVelox

    Speed, safety, and cost are all central concerns surrounding disaster recovery (DR). This is where cloud comes into play. Access this data sheet to learn about the key functions that cloud-based DR for AWS delivers and how they'll impact your business.

  • Key Features To Consider When Deciding On A NGFW Technology

    Sponsored by: Forcepoint

    There are 3 main drivers for a NGFW technology deployment: integration with security workflow, total cost of ownership, and security effectiveness. In this NSS Labs webcast, learn market trends for NGFWs and uncover key features to consider when selecting an NGFW technology.

  • How to Keep Your Data Secure In An Increasingly Insecure World

    Sponsored by: Micron

    Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.

  • Develop Your Information Security Management System

    Sponsored by: SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

    This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.

  • The Importance of Incident Management Services

    Sponsored by: Dell SecureWorks

    The worst time to realize you are not prepared for a security incident is during a breach. Without a proven response plan or strategy, stressed personnel must make crucial decisions without a clear sense of order and priority. Discover how to prepare your enterprise for a security incident in this white paper.

  • Managed Detection and Response

    Sponsored by: Dell SecureWorks

    Being resilient to a threat from an advanced adversary is dependent on your organization's integrated capabilities to quickly detect them and respond. In this white paper, learn how you can employ and tune the security tools at your organization to combat today's threats.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

  • Third-Party Risk Management: How to Avoid the Dangers of Weak Controls

    Sponsored by: ModoModo

    If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.