ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • How MDM and the Consumerization of IT are Reshaping IT Decision-Making

    Sponsored by: TechTarget Security

    Access this white paper to learn why your organization needs to start integrating IT consumerization and BYOD into its business – and how to get there.

  • Managing Cloud Computing Risk

    Sponsored by: TechTarget Security

    Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.

  • Taking a Strategic Approach to Risk Management

    Sponsored by: TraceSecurity

    This e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more.

  • Cybersecurity Information Sharing: Establishing New Protocols

    Sponsored by: BMC Software, Inc.

    This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.

  • The truth about cloud storage in health care

    Sponsored by: EMC Isilon

    This e-guide takes an in-depth look at what it means for health care organizations looking to store data off-site and, specifically, in the cloud. Read now to uncover how you can ensure your cloud provider measures up to HIPAA's stringent regulations.

  • Secure your data – protect your business

    Sponsored by: TechTarget ComputerWeekly.com

    This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.

  • Presentation Transcript: Confidential Documents at Risk

    Sponsored by: WatchDox

    Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.

  • Computer Weekly - 10 January 2012: What’s in store for IT this year?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now.

  • Remote Vendor Access: Not All Access Should Be Treated Equally

    Sponsored by: Dell Software

    This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.

  • 2012 - Endpoint Security Best Practices Survey

    Sponsored by: Symantec Corporation

    Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.

  • HP Fortify Software Security Center- Proactively Eliminate Risk in Software

    Sponsored by: Hewlett Packard Enterprise

    Learn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook.

  • Best Practices in Securing Your Customer Data in Salesforce, Force.com, and Chatter

    Sponsored by: CipherCloud

    Many organizations want to move to the Salesforce platform, but concerns about data security, privacy, residency, and compliance have held them back. This whitepaper outlines best practices in securing sensitive customer data in Salesforce and outlines "must have" capabilities to overcome emerging cloud threats.

  • Business-Driven Identity and Access Management: Why This New Approach Matters

    Sponsored by: Aveksa

    This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.

  • The Ten Must Haves for Secure Mobile Device Management

    Sponsored by: Zenprise

    Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.

  • Protect citizen data with IBM Rational software

    Sponsored by: IBM

    Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.

  • Holistic risk management: Perspectives for IT professionals

    Sponsored by: IBM

    Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.

  • Healthcare Information at Risk: Encryption is not a Panacea

    Sponsored by: Intel

    This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.

  • Approaches for Agile development teams

    Sponsored by: IBM

    This expert e-guide discusses the different approaches for agile development teams. Learn about a handful of methods from experts Mary LeMieux-Ruibal, Mirkeya Capellan and Lisa Crispin, including focusing more on trends than numbers, employing a risk-based testing approach, calculating testing costs and much more.

  • Risk Management: Safeguarding Against a World of Threats

    Sponsored by: HP Enterprise Security

    Access this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.

  • Supporting information technology risk management

    Sponsored by: IBM

    Access the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions.

  • Establishing a Formal Cyber Intelligence Capability

    Sponsored by: Verisign, Inc.

    While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.

  • How much security do you really need?

    Sponsored by: IBM

    Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.

  • Channel executives see need to bolster hospital IT security

    Sponsored by: Hewlett Packard Enterprise

    Regardless of the size of the institution, hospitals need a sufficient IT security system in place. This E-guide explores why channel professionals and VARs should not only understand hospital vulnerabilities but also be able to convince customers that risk mitigation is worth the price.

  • Comparing health care data security compliance to other industries

    Sponsored by: Hewlett Packard Enterprise

    This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.

  • Risk-Based Test Automation from a Business Process Perspective: Automating the Testing of Critical Business Processes Enables you to Manage Change More Effectively

    Sponsored by: Worksoft

    Being able to adapt your business processes to changing environments effectively is crucial to the overall success of your business. Read this white paper to learn how SAP users can implement the best risk-based testing strategies and the right automated testing tool to accommodate change.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.