RSS feed Get our RSS feed

News by Topic

mitigate

Results 226 - 250 of 259Sort Results By: Published Date | Title | Company Name
By: Oracle Corp.     Published Date: Jan 16, 2013
As business operations become more complex, the demand for change in IT increases, along with the associated risks that must be mitigated.
Tags : oracle, 11g, database, oltp, oracle exadata
     Oracle Corp.
By: Symantec     Published Date: Dec 28, 2015
Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Tags : code signing, wireless networks, transferring code, content distribution, security
     Symantec
By: XOsoft     Published Date: Aug 21, 2009
Mitigate risk and lower costs by letting your disaster recovery replica server double as a server for performing an offsite backup. This informative white paper will teach you how...
Tags : disaster plan, backup plan, backup and recovery, redundant, server replication, cost control, it spending, disaster recovery
     XOsoft
By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
     Avalere
By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
     Decru
By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats
     GFI
By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
     Perimeter
By: Thinksoft     Published Date: Dec 03, 2007
This white paper acts as a tool, for CEO's and Business and IT heads, helps reduce application deployment risks and costs. This paper attempts to establish how outsourcing test services to an independent domain-focused specialist company can substantially mitigate deployment risks. Business users are assured of receiving reliably better quality application well within cost and time budgets.
Tags : outsourcing, outsourced software testing, software testing, testing vendor, stages in outsourced software testing, independent software testing, thinksoft
     Thinksoft
By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
     CA ITAM
By: HP - Enterprise     Published Date: Jun 05, 2013
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Tags : mobile apps, applications, security threats, mobile computing, security vulnerabilities
     HP - Enterprise
By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : amy babinchak, best practices, bob egan, expert content, information technology, it security, josh lipton, ken wineberg
     Focus
By: Compinsense     Published Date: Aug 30, 2010
Now more than ever, companies need to establish a solid foundation for their compensation and people programs. Learn how to mitigate your risk to employee lawsuits, keep your employees engaged and make the right decisions about your reward programs during these tough economic times.
Tags : lawsuits, employee lawsuit, wage, hour litigation
     Compinsense
By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft
     Lumension
By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
     Blue Coat Systems
By: AtTask     Published Date: Feb 11, 2012
To protect their investment in a project, an organization needs to engage in a three step process to put a reasonable and viable risk management plan in place. This free guide walks you through the process.
Tags : project risk management, risk management tools, it project risk management, enterprise risk management, risk management plan, business risk management
     AtTask
By: Endace     Published Date: May 15, 2012
As organizations become more dependent on their data networks, the impact of network performance problems on human productivity is turning into a serious business risk. To mitigate this risk, organizations are investing in network visibility tools.
Tags : endace, architecture, high-speed, networks, high-speed networks
     Endace
By: HP and Intel® Xeon® processors     Published Date: Dec 20, 2012
Download this IDC Whitepaper to learn how using appropriate technology in consistent ways helps SMB organizations mitigate business risk and improve overall business protection by avoiding unplanned downtime.
Tags : business risk, effective technology, idc
     HP and Intel® Xeon® processors
By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : asset management, technology, software asset management, compliance, mitigation of security risks, automation, security
     ServiceNow
By: HireRight     Published Date: May 01, 2013
There are a number of reasons why shrewd staffing agencies run background checks on potential employees before inviting them in to their business and, in turn, into their customers’ businesses. Background screening may be required by law for certain placements and industries, or, the customer may require screening. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that can arise from bad hires and how careful background screening can help mitigate those risks.
Tags : staffing, hireright, human resources, hr department, clients, potential employees
     HireRight
By: HireRight     Published Date: May 01, 2013
Franchise owners have the benefit of brand recognition and a proven business model and plan. It is up to you, as a franchisee, to make your location successful and this success lies heavily on the staff you hire. Background screening may be required by law for certain franchise employees, depending upon the nature of the business. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : hireright, human resources, hr department, investments, properly screen employees, franchise owners
     HireRight
By: HireRight     Published Date: May 01, 2013
Do no harm and help heal are some of the top responsibilities for health care providers. The first step in meeting these requirements is to make sure your employees are worthy of your trust and that of your patients. Background screening is required by law for health care providers in many instances. In all instances, failure to properly screen health care employees can have serious business and financial consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : background screening, health care providers, responsibilities, hireright, risks of bad hires
     HireRight
By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : field employees, screening, hireright, human resources, in home services screening
     HireRight
By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management
     IBM
By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks
     Cisco
By: Delphix     Published Date: Mar 24, 2015
You may not be as protected from data loss as you thought you were. Download this infographic to see how you may be compromised.
Tags : 
     Delphix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics