ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Why the Endpoint Must be the New Security Focus

    Sponsored by: Bit9, Inc.

    Download this new eBook now to learn how a holistic security stance that combines network and endpoint security will provide greater automated intelligence and network-layer awareness and best practices for achieving real-time situational awareness to improve security and allow for better-informed decision-making.

  • Making the Most of BYOD Opportunities

    Sponsored by: Dell and VMware

    Access this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity.

  • Clearswift Government Communications 2.0

    Sponsored by: Clearswift

    In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.

  • Mastering Risk with Business Forecasting

    Sponsored by: IBM

    This paper discusses how it is risk management practices that play a key part of managing risk today, and shows how developing a more sophisticated understanding of risk and building the management capabilities to match can help organizations stay afloat during tumultuous times.

  • IBM X-Force 2013 Mid-Year Trend and Risk Report

    Sponsored by: IBM

    In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).

  • Touro Infirmary

    Sponsored by: NetApp

    In this brief case study, you will discover how a healthcare provider, based in New Orleans, deployed a unified storage solution for efficiency and data management at scale. Find out how this technology enabled the healthcare provider to reduce risk, integrate application support and business continuity.

  • As data grows, so do the risks: How to improve data and app sec

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

  • Endpoint Security Technology

    Sponsored by: Symantec Corporation

    Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.

  • WatchGuard- Data Loss Prevention

    Sponsored by: WatchGuard Technologies, Inc.

    This infographic will help you learn critical information about data security and the challenges today’s business face when it comes to keeping data safe.

  • Planning a Career Path in Cybersecurity

    Sponsored by: Global Knowledge

    The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.

  • Advances in Financial Disclosure and Risk Management

    Sponsored by: IBM

    This on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.

  • Security University: Cloud Security

    Sponsored by: TechTarget Security

    Learn strategies for how to positively influence the security of cloud computing projects in your organization.

  • 2013 Cost of Cyber Crime – UK, France and Germany Findings

    Sponsored by: Hewlett-Packard Enterprise

    Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.

  • A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

  • Provide Better Visibility and Manageability across Network Security Tools

    Sponsored by: WatchGuard Technologies, Inc.

    Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment.

  • Moving to DevOps Speeds Deployment and Boosts ROI

    Sponsored by: IBM

    This essential E-Guide highlights the benefits of a DevOps approach and explores how business can successfully integrate their teams to increase collaboration, streamline testing processes and reduce risks.

  • Hidden Lynx: Professional Hackers for Hire

    Sponsored by: Symantec Corporation

    In this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.

  • Stuxnet 0.5: The Missing Link

    Sponsored by: Symantec Corporation

    In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.

  • Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It

    Sponsored by: Symantec Corporation

    Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid.

  • Symantec Intelligence Report - August 2013

    Sponsored by: Symantec Corporation

    In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.

  • Computer Weekly – 22 October 2013: How technology is making business more human

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how new technologies are changing the way that businesses are run and employees are managed. Our new buyer's guide looks at the options for finance and insurance for IT and how it can help mitigate IT security risks. And we report from VMware's European user conference. Read the issue now.

  • Moving Up the Software License Optimization Maturity Curve to Drive Business Value

    Sponsored by: Flexera Software

    Defining and implementing a strategy for software asset management (SAM) and license optimization isn't easy -- but with the right tools and processes, it's definitely possible. Access this informative resource to explore the common challenges of SAM, and how you can ensure your software license optimization program is on its way to full maturity.

  • Rentokil Initial Improves Software Asset Management

    Sponsored by: Flexera Software

    Rentokil Initial, one of the largest business services companies in the world, was struggling with managing their software assets. In this case study, find out how Rentokil was able to implement a mature software asset management process and gain complete control over their software licenses, for reduced costs and lower risk.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • Endpoint Security: Anti-Virus Alone is Not Enough

    Sponsored by: Lumension

    Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.