Find White Papers
Home
About Us
List Your Papers
    
> Technology > Enterprise Applications > Risk Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Risk Management

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 201 - 225 of 245Sort Results By: Published Date | Title | Company Name
White Paper Published By: ScriptLogic     Published Date: Nov 14, 2011
This white paper discusses why no one likes asset management, what tools are and are not helpful and why you need to tie assets back to contracts.
Tags : 
software license management, license management, software, sciptlogic, asset
    
ScriptLogic
White Paper Published By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : 
pci compliance, compliance, scriptlogic, pci, security standard
    
ScriptLogic
White Paper Published By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : 
security, anti spam, email security, image spam, malware
    
Secure Computing
White Paper Published By: SEPATON     Published Date: Mar 11, 2008
Computerworld research unveils how enterprises are responding to growing data protection challenges. This report benchmarks how an organization’s data protection decisions impact business efficiency – based on a survey of enterprise IT decision-makers. Sponsored by SEPATON.
Tags : 
data protection, computerworld, backup, recovery, sepaton
    
SEPATON
White Paper Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.
Tags : 
shavlik, power management, security, cyberattacks, internet attacks
    
Shavlik Technologies
White Paper Published By: Shavlik Technologies     Published Date: Apr 14, 2011
How can an organization manage both their physical environment and their virtual environment without doubling up on the work, missing critical patches on offline virtual machines, or even missing patches on the virtual machines they are not even aware of?
Tags : 
shavlik, patch management, virtual machine, physical, network patching
    
Shavlik Technologies
Webinar Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This webinar will cover the challenges of relying exclusively on either AV or patch and configuration management for threat resistance and why a combined approach is the best option.
Tags : 
shavlik, anti-malware, patch management, configuration management, virtualization
    
Shavlik Technologies
White Paper Published By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment
    
Shavlik Technologies
White Paper Published By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : 
shavlik security, system protection, automated patch management, risk, antivirus
    
Shavlik Technologies
White Paper Published By: Skillsoft     Published Date: Apr 01, 2011
In this report, we will take a look at the IT-related activities from the ITPro and AnalystPerspectives collections, as well as the most popular IT and business search terms.
Tags : 
analystperspectives, itpro, books24x7, cloud computing, mobile computing
    
Skillsoft
White Paper Published By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability
    
Solidcore
White Paper Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
When it comes to data protection and recovery, many businesses are not as safe as they believe. Read on to find out what you should consider when creating your backup and disaster recovery plan.
Tags : 
storagecraft, recovery, backup, cloud, strategies
    
StorageCraft® Technology Corporation
White Paper Published By: Stratus Technologies     Published Date: Dec 01, 2008
Certainly server virtualization offers an elegant way to minimize planned downtime during routine software and hardware maintenance, or scheduled upgrades. But that addresses only part of the availability story.
Tags : 
stratus technology, server virtualization, virtual machine, automated software, data centers
    
Stratus Technologies
White Paper Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices
    
Stratus Technologies
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Most organizations today understand that a disaster recovery (DR) plan is essential to their continued survival should a natural disaster occur. But implementing a DR plan entails substantial time, effort and cost - not to mention significant investment in developing new areas of technical expertise within the organization. As a result, many organizations are turning to disaster recovery service providers (DRSPs) to offload their disaster recovery operations.
Tags : 
sungard, recovery, service, organizations, disaster
    
SunGard
White Paper Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.
Tags : 
sungard, sungard availability services, disaster recovery, it recovery, data loss protection
    
SunGard Availability Services
White Paper Published By: Sybase PowerBuilder     Published Date: Jan 19, 2012
Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).
Tags : 
sybase, powerbuilder, data, development, applications
    
Sybase PowerBuilder
White Paper Published By: Symantec     Published Date: Apr 09, 2012
Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jun 02, 2011
Download this survey now to understand the attitudes and practices of SMBs toward disaster preparedness.
Tags : 
symantec, smb, disaster prepardness survey, backup and recovery, data protection
    
Symantec
White Paper Published By: Symantec.cloud     Published Date: Nov 14, 2011
This paper discusses the many drivers for organizations looking to move email to the cloud and highlights the shortcomings of some of these solutions.
Tags : 
host, hosted email, security, compliance, redundancy
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 28, 2011
This white paper discusses how SaaS can simplify IT management.
Tags : 
symantec.cloud, it security management, saas, risk prevention, security
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 18, 2011
This white paper focuses on the critical need to manage outbound content sent via various avenues including email, Instant Messages, text messages, tweets, and Facebook posts.
Tags : 
symantec cloud, outbound content management, email, messaging, risk mitigation
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Nov 29, 2010
Read the latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : 
messagelabs us, it security, smb, risk management, protection
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Aug 10, 2010
Off-the-shelf instant messaging (IM) lets malware into the Enterprise, and compromises regulatory compliance and copyright protection. Find out how a secure IM service can keep you covered.
Tags : 
messagelabs us, instant messaging, malware, information mobile worker, saas
    
Symantec.cloud
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search