Assessing Risk White Papers

(View All Report Types)
Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

Hard Hat Area: Myths and Pitfalls of Data Mining
sponsored by SPSS Inc. Worldwide Headquarters
WHITE PAPER: The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

SPSS Inc. Worldwide Headquarters

Risk Management for Cloud Computing
sponsored by TechTarget CIO
WHITE PAPER: This expert resource provides in-depth insight and risk management advice for IT leaders looking to benefit from the cloud. Read now for 20 questions that should be asked of every cloud provider, as well as well as advice for creating harmony between compliance and information security functions, and much more.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

TechTarget CIO

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.
Posted: 10 Sep 2009 | Published: 16 Oct 2008

Oracle Corporation

EMC Isilon for Healthcare
sponsored by Pivotal
WHITE PAPER: This brief resource provides information on a solution that reduces costs and improves operational efficiency by consolidating image data from each department PACS into a single, unified independent storage solution.
Posted: 16 May 2014 | Published: 31 Oct 2012

Pivotal

2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

2010 Endpoint Risk Assessment: Internal Vulnerabilities
sponsored by Promisec
WHITE PAPER: This study will show you the most common security issues that were found and how they were dealt with by the various organizations.
Posted: 23 May 2011 | Published: 23 May 2011

Promisec

Guide to OCC updates to governance ruling
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Iron Mountain

Combating risk with predictive intelligence: An analytical approach to enterprise risk management
sponsored by IBM
WHITE PAPER: View this resource to learn more about how your organization can respond and increase their focus on refining sales and operations planning processes. It outlines how companies can reevaluate and distribute their channel strategies and strengthen relationships.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

IBM