Risk Assessment Research
-
Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
Sponsored by: Information Security MagazineCheck out this eBook and get expert advice that can help your company successfully improve its threat management posture.
-
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: TechTarget SecurityThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: TechTarget SecurityThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: TechTarget SecurityThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
Lumension Vulnerability Scanner Offer
Sponsored by: LumensionThis network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.
-
Hard Hat Area: Myths and Pitfalls of Data Mining
Sponsored by: SPSS Inc. Worldwide HeadquartersThe intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners.
-
Virtualization Podcasts: Infrastructure Solutions for Midsized Companies
Sponsored by: IBMMidsized businesses need IT solutions that will help them by cutting costs, adding capabilities and reducing risks. Hear about key technologies, trends, best practices and solutions from IBM experts, IBM Business Partners and Industry Analysts that will help you address the IT challenges facing your growing business.
-
Ethical Hacking and Risk Assessments
Sponsored by: Global KnowledgeAttend this webcast to learn about risk assessment process and tools used by ethical hackers.
-
IBM System x Servers - The Right Choice. Open. Easy. Green
Sponsored by: IBMIBMSystemx is a portfolio of robust servers built on IBMX-Architecture's our blueprint for bringing innovation tox86systems. Innovation that helps set you apart from the competition. Learn more in this paper.
-
Distributed Capture Platforms: Reducing Costs, Removing Bottlenecks and Mitigating Risks
Sponsored by: EMC CorporationRemote workforces are a growing trend that has documentation implications on your business processes. This paper explores that, placing special emphasis on a distributed capture strategy for resolving remote workforce-related issues.
-
Protecting Credit Card Data: How to Achieve PCI Compliance
Sponsored by: Motorola SolutionsThis white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
-
SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects
Sponsored by: HCL SoftwareThis white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool.
-
Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk
Sponsored by: IBM Line of BusinessRisks can impact the top and bottom line and eventually every risk is expressed in the company's share price.
-
3 Key Components of a Risk-Based Security Plan
Sponsored by: Foundstone, Inc.This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
-
A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
Sponsored by: IBMThis white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
-
Vulnerability Management for GLBA Compliance
Sponsored by: Qualys, Inc.The QualysGuard vulnerability management and policy compliance solution helps financial institutions to meet many key security guidelines.
-
Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk
Sponsored by: Pitney Bowes Group 1 SoftwareWhat is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates.
-
Best Practices in Data Management
Sponsored by: SASThe key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM.
-
Asset: Healthcare 2015 and U.S. Health Plans New Roles, New Competencies
Sponsored by: IBM Line of BusinessThe U.S. healthcare system is on an unsustainable path that will force its transformation.
-
Increase Productivity and Reduce Security Risks for Teleworkers
Sponsored by: SonicWALLThis paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
-
Acquire a global view of your organization's security state: the importance of security assessments
Sponsored by: IBM Software GroupSecurity assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
-
The importance of security assessments
Sponsored by: IBMThis white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
-
Drive business value with innovation for security defense
Sponsored by: IBMThis white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
-
Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
Sponsored by: SonicWALLSSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
-
Extend Business Reach with a Robust Security Infrastructure
Sponsored by: IBM Software GroupThis white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.