Find White Papers
Home
About Us
List Your Papers
    
> Technology > Enterprise Applications > Risk Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Risk Management

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 101 - 125 of 235Sort Results By: Published Date | Title | Company Name
White Paper Published By: Kaspersky     Published Date: Feb 14, 2014
In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.
Tags : 
kaspersky, security, it security, data protection, intrusion detection
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: Feb 14, 2014
Are you guarding the cyber security gaps with patch management? Download Kaspersky Lab’s latest whitepaper, Your Data under Siege: Guard the Gaps with Patch Management, to learn about: how cybercriminals are utilizing weaknesses in trusted applications to distribute malware.
Tags : 
patch management, cybersecurity, firewalls, malware, hackers
    
Kaspersky
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : 
pdf, pdf security, locklizard, software, cost savings
    
LockLizard
White Paper Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor
    
LogRhythm
White Paper Published By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system
    
Lumension
White Paper Published By: Lumension     Published Date: Mar 28, 2011
This paper highlights the four steps organizations should take to automate and streamline the patch management process.
Tags : 
lumension, patch management, patch deployment, vulnerability, risk mitigation
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 19, 2010
Finding Ways to Balance IT Risk and Productivity. Learn how to strike a happy balance that allows for the safe use of new technologies - without the risk.
Tags : 
lumension security, consumerized workforce, it risk, productivity, collaborative
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : 
lumension security, patch management, vulnerability management, risk mitigation, best practices
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application
    
Lumension
White Paper Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security
    
Lumension
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
Webinar Published By: Mainline Information Systems     Published Date: Oct 20, 2009
Get the critical information you need to transform your data center by implementing a solution based on the greatest possible computing power with the lowest possible energy expenditure.
Tags : 
energy efficiency, mainline information systems, infrastructure, risk management, thermal performance
    
Mainline Information Systems
White Paper Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This white paper will discuss the steps necessary to building a resilient business.
Tags : 
business continuity, mainline information systems, downtime, data loss, risk assessment
    
Mainline Information Systems
White Paper Published By: Marketo     Published Date: Jul 31, 2012
The Definitive Guide to Marketing Metrics and Marketing Analytics shows marketing professionals how to talk the talk of C-level executives in terms of forecasting and reporting, and walk the walk to the revenue table by leveraging metrics that matter.
Tags : 
definitive, guide, marketing, metrics, analytics
    
Marketo
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.
Tags : 
security management platform, siem, log management, security management 2.0, anti spam
    
McAfee
Case Study Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security
    
McAfee
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.
Tags : 
mcafee, security, pci, hipaa, epolicy orchestrator
    
McAfee Inc
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals
    
McAfee Inc
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
Email is an indispensible tool for businesses today, but it's also a favorite vehicle for spammers and cybercriminals. This brief explains the key benefits of implementing an email security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security
    
McAfee Inc
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
Most midsized businesses aren't fully aware of the number of vulnerabilities that exist on their networks. Is it possible to address them all? This brief explains the key benefits of implementing a network security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, hackers, security
    
McAfee Inc
White Paper Published By: MessageLabs     Published Date: May 28, 2008
So-called "redirector" or "search engine" spam emerged in late 2007 and has now grown into a significant threat to businesses. In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
spam, anti-spam, anti spam, email security, trojan
    
MessageLabs
White Paper Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality
    
MessageLabs Ltd.
White Paper Published By: Microsoft Dynamics     Published Date: Apr 13, 2007
This white paper walks through the key areas of a financial management solution so when you are evaluating current and future financial management software, you are prepared to avoid challenges and maximize your investment.
Tags : 
financial management, finance software, financial software, microsoft, microsoft white paper
    
Microsoft Dynamics
White Paper Published By: Microsoft Office     Published Date: Nov 24, 2008
This white paper highlights key challenges facing the professional services industry and discusses how the 2007 Microsoft® Office system can help professional services firms enhance business performance by maximizing employee contributions. It also offers examples of firms realizing business impact from their early use of the 2007 Office system, which provides innovative and powerful enterprise-scale capabilities that extend far beyond improving personal productivity.
Tags : 
2007 microsoft office system, microsoft office project 2007, infopath foams services, it management, enterprise applications
    
Microsoft Office
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      
Madison Logic