Risk Assessment Research
-
The High Stakes of Security: Protecting Your Brand
Sponsored by: IBM Software GroupThis white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization...
-
Video: Move Beyond Efficiency to Deliver Value with IBM Service Management
Sponsored by: IBM Software GroupIBM Service Management can help IT organizations deliver service excellence, through a structured approach that can enable better governance and help manage risk, delivering business value. Watch this video to learn how you can deliver quality ...
-
Online Demo - Vulnerability Management & Policy Compliance Overview
Sponsored by: Qualys, Inc.Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
-
SOA: A Perspective on Implementation Risks
Sponsored by: Infosys Technologies LimitedIf potential risks to a SOA implementation are not identified during the planning process, they can be difficult to mitigate during the implementation. Read this paper to learn how an awareness of these risks can help ensure a successful adoption.
-
Automated Penetration Testing; Can IT Afford Not To?
Sponsored by: Core Security TechnologiesThis paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
-
AppDetective
Sponsored by: Application Security, Inc.Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
-
Cisco Business Continuance Solutions
Sponsored by: Cisco Systems, Inc.A robust business continuance plan includes technology solutions to address recovery and data protection needs of business-critical applications.
-
HDS Business Continuity Services
Sponsored by: Hitachi VantaraLearn how a business continuance plan can ensure survival by ensuring the continuous flow and availability of data.
-
What's New in Group Policy Administrator 5.0
Sponsored by: SUSEManaging Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.
-
Service Management with AppManager
Sponsored by: SUSESign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
-
VigilEnt Policy Center 4.2 Trial
Sponsored by: SUSEVigilEnt Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
-
NetIQ Security Solutions for iSeries Trial
Sponsored by: SUSENetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
-
Directory and Resource Administrator 7.5 Trial
Sponsored by: SUSENetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
-
Introducing AppManager 6.0
Sponsored by: SUSESign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
-
Ensuring VoIP Quality of Service
Sponsored by: SUSECompanies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
-
AppManager 6.0.2 Trial
Sponsored by: SUSEThe NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.
-
Addressing the Insider Threat with NetIQ Operational Change Control Solutions
Sponsored by: SUSEDownload "Addressing the Insider Threat with NetIQ Operational Change Control Solutions" to get the expert advice you need to build a comprehensive management system that reduces and eliminates the risk of an insider threat.