Risk Management Research
-
How to Solve Security Problems Within Your Organization
Sponsored by: WisegateAccess this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
-
Information Security Emagazine: Best Practices for the Evolving Threat Landscape
Sponsored by: Hewlett-Packard EnterpriseIn this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.
-
Rabobank International Enabling Customers to Bank Safe With HP
Sponsored by: Hewlett-Packard EnterpriseView this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
-
Cloud Security as a Service For Secure Cloud-Based Server Hosting
Sponsored by: TechTarget SecurityAccess this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks.
-
Endpoint Security IT Decision Center Handbook 3
Sponsored by: TechTarget SecurityAccess this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
-
Private Cloud Computing Security Issues
Sponsored by: TechTarget SecurityAccess this expert resource to uncover some of the most notable cloud computing security issues to watch out for before deploying a private cloud.
-
Managing Hybrid Cloud Computing Risks
Sponsored by: TechTarget SecurityAccess this resource to explore two key security questions to ask when it comes to your hybrid cloud computing project, and whether or not you have the right management tools to ensure a secure environment.
-
Best Practices For Your Threat Management Program
Sponsored by: IBMIn this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features!
-
Endpoint Security Best Practices
Sponsored by: Symantec CorporationIn this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.
-
Endpoint Security IT Decision Center Handbook 2
Sponsored by: TechTarget SecurityAccess this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
-
KPN focuses on Information Security with HP
Sponsored by: Hewlett-Packard EnterpriseView this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
-
The State of Next-Generation Market- and Credit-Risk Analytics
Sponsored by: IBMAccess the following white paper to gain a firsthand look at the next-generation market and credit-risk analytics that are helping many companies through this touch economic time.
-
Integrating security with HP TippingPoint
Sponsored by: HP & Intel®Access this resource to explore the key features of an intrusion prevention system (IPS) solution that keeps highly-virtualized, hybrid-delivered cloud services secure while ensuring top delivery performance.
-
Expert Strategies: How to Adapt to Social Media While Making Sure You Stay Compliant
Sponsored by: BloombergIn this expert white paper, gain insight on how to successfully keep compliant while protecting your business from the potential risks associated with using social media as a business tool.
-
Mobile Security Insider's Edition
Sponsored by: TechTarget SecurityThis Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
-
Why You Need A Next-Generation Firewall
Sponsored by: Hewlett Packard EnterpriseThis white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
-
Mapping Security For Your Virtual Environment
Sponsored by: Hewlett Packard EnterpriseIn this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Strong Authentication: Achieve the Level of Identity Assurance You Need
Sponsored by: HID GlobalIn this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
-
Emerging Security Trends and Risks: Insights for the Business Executive
Sponsored by: IBMThis report identifies key emerging cyber-threats, detailing why IT managers need to create proactive security intelligence capabilities, unified endpoint management, data protection, and social guidance to best prepare for today's evolving threat landscape.
-
System z, x86, UNIX: Which is more secure?
Sponsored by: IBMAccess this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.
-
Sample Corporate Mobile Device Acceptable Use and Security Policy
Sponsored by: WisegateIn this exclusive white paper, gain insight on how senior-level IT security professionals have approached the bring-your-own-device (BYOD) trend thus far, and which strategies have led to success or failure.
-
How Can You Avoid a Web Security Breach? It's All in the Preparation
Sponsored by: TechTarget SecurityIn this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
-
Server Security Survey Report
Sponsored by: Bit9, Inc.In October 2013, Bit9 conducted a survey on server security designed to analyze challenges in the inability to detect or stop advanced attacks – click now to discover key findings and takeaways.
-
Why the Endpoint Must be the New Security Focus
Sponsored by: Bit9, Inc.Download this new eBook now to learn how a holistic security stance that combines network and endpoint security will provide greater automated intelligence and network-layer awareness and best practices for achieving real-time situational awareness to improve security and allow for better-informed decision-making.