• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

corporate risk

Results 76 - 82 of 82Sort Results By: Published Date | Title | Company Name
By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies, mitigating risk, pum, security
    
NETIQ
By: CEB     Published Date: May 19, 2014
Establishing compliance training requirements has always been difficult, but given recent changes to the regulatory and corporate work environments, the costs of failure are now more significant. To help companies get their training curricula right, CEB created a step-by-step guide to building a truly effective compliance training curriculum: one that reduces risk.
Tags : 
ceb, risk based compliance, training, reduce risk, regulatory changes, corporate work environments
    
CEB
By: Dell EMC     Published Date: Feb 23, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace that allows employees to access corporate data, applications, and communication resources on their devices of choice. But making the most of the opportunity while minimizing risks can be complex and overwhelming for many IT teams. Therefore, it makes more sense than ever for IT leaders to consider virtual client computing (VCC), also commonly referred to as virtual desktop infrastructure (VDI) solutions.
Tags : 
    
Dell EMC
By: IBM     Published Date: Jul 14, 2016
Enterprise risk management (ERM) is moving to the top of corporate agendas, and evidence shows strategic risk is a key factor in a robust ERM framework. Check out this white paper from risk management pioneer James Lam. In it, Lam explains why every organization should be focusing on strategic risk. You'll learn how to integrate risks into the planning process, use economic capital and risk-adjusted return on capital to measure risk, and how to apply these results.
Tags : 
best practices, risk management, enterprise, technology, frontier, it management, enterprise applications
    
IBM
By: Palo Alto Networks     Published Date: Sep 30, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge
Tags : 
palo alto, security framework, security, business leaders, digital
    
Palo Alto Networks
By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : 
data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
    
Lookout
By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : 
cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx, vsrx
    
Juniper Networks
Start   Previous    1 2 3 4     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter