Risk Management Research
-
VigilEnt Policy Center 4.2 Trial
Sponsored by: SUSEVigilEnt Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
-
NetIQ Security Solutions for iSeries Trial
Sponsored by: SUSENetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
-
Directory and Resource Administrator 7.5 Trial
Sponsored by: SUSENetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
-
Ensuring VoIP Quality of Service
Sponsored by: SUSECompanies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
-
AppManager 6.0.2 Trial
Sponsored by: SUSEThe NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.
-
Introducing AppManager 6.0
Sponsored by: SUSESign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
-
Addressing the Insider Threat with NetIQ Operational Change Control Solutions
Sponsored by: SUSEDownload "Addressing the Insider Threat with NetIQ Operational Change Control Solutions" to get the expert advice you need to build a comprehensive management system that reduces and eliminates the risk of an insider threat.
-
Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
Sponsored by: Symantec CorporationInstant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.