Risk Management Research
-
Preventing Security Risks in Real Time
Sponsored by: IBMThis resource investigates why developing security intelligence – the ability to predict, identify, and react to potential threats – is a key priority in today's evolving threat landscape.
-
Unlock security success: Is security intelligence the key?
Sponsored by: IBMThis report from Forrester Research takes an inside look at the security intelligence (SI) market, explaining why SI needs to be an IT priority. Also inside, learn about the ongoing challenges that CISOs face, discover the growing interest in security-as-a-service, and more.
-
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
Sponsored by: LumensionIn this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
-
Malicious Mobile Apps
Sponsored by: OpenText Security SolutionsIn this white paper, get industry statistics about today's IT threat landscape, and why IT professionals should heighten mobile security to defend against significant malicious mobile applications.
-
Weaponized malware now threatens the private sector
Sponsored by: LumensionAccess this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
-
Vulnerability Assessment
Sponsored by: Symantec CorporationAccess this whitepaper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to find an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionIn this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
Security Intelligence – Is Security a Battle You Can Win
Sponsored by: IBMThis white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
-
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
Sponsored by: LumensionThis case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
-
Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
Sponsored by: Core Security TechnologiesThis white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
-
Cutting Complexity – Simplifying Security
Sponsored by: KasperskyKaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
-
IT Security. Fighting the Silent Threat
Sponsored by: KasperskyKaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
-
CORE Security and the Payment Card Industry Data Security Standard
Sponsored by: Core Security TechnologiesThis informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times.
-
A-B-C Strategies for Hitachi Data Systems File and Content Solutions
Sponsored by: Hitachi VantaraIn this brief white paper, you will gain insight into a single, integrated platform to manage all your structured and unstructured data. Find out how you can move from expensive silos of stored data to a streamlined, cloud-ready solution that simplifies management, reduces risks and supports innovation for the future.
-
The Azzurri IT Leader Peer-to-Peer Opinion Exchange 2013
Sponsored by: AzzurriThis resource features an opinion exchange on the trend in mobile device use for business workload, whether it's bring-your-own-device (BYOD), choose-your-own-device (CYOD), or don't-bring-your-own-device (DBYOD), and what this means for data security.
-
Netwrix Auditor Enterprise Edition
Sponsored by: Netwrix CorporationWhen diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
-
Three Mistakes Companies Make When It Comes to Vulnerability Management
Sponsored by: Core Security TechnologiesIn this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
-
Liquidity risk management; Assessing and planning for adverse events
Sponsored by: IBMThis paper takes a close look at the factors involved in the recent crisis and the patterns that resulted in widespread liquidity problems. It also points to specific vulnerabilities faced by financial institutions currently, and highlights best practices for liquidity risk management
-
Building An Intelligence - Driven Security Operations Center
Sponsored by: EMC CorporationAccess this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
-
The Personalisation Challenge: Business Culture and Mobile Security
Sponsored by: Hewlett Packard EnterpriseThis exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
-
Implementing an Effective Vulnerability Management Program
Sponsored by: TenableAccess this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
-
Keep Cloud Compliant
Sponsored by: TechTarget SecurityAccess this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
-
Ballarat Grammar Secures BYOD with HP Sentinel SDN
Sponsored by: Hewlett Packard EnterpriseIn this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
-
Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
Sponsored by: OpenText Security SolutionsThis expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
-
An insurance firm eases regulatory compliance while reducing risk
Sponsored by: IBMLearn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.