assessment

Results 276 - 300 of 534Sort Results By: Published Date | Title | Company Name
By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
     Trend Micro SPN
By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging
     Trend Micro SPN
By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models, cat, centroid, collective catastrophe, multilingual data, risk exposure
     Trillium Software
By: Mainline Information Systems     Published Date: Oct 20, 2009
This white paper will discuss the steps necessary to building a resilient business.
Tags : business continuity, mainline information systems, downtime, data loss, risk assessment, bcd, data protection, backup, platform protection, archiving
     Mainline Information Systems
By: Mainline Information Systems     Published Date: Oct 27, 2009
This webcast will describe the new features of TSM 6.1 and will recommend strategies for assessing your current environment, upgrading to 6.1 and how to maximize the monitoring benefits. We will include lessons learned and advice for avoiding pitfalls.
Tags : ibm, tivoli, storage manager, tsm, data management, assessment, remote administration, conversion
     Mainline Information Systems
By: EdgeWave     Published Date: Oct 15, 2011
Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.
Tags : edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation, filtering, filter, demands, short-term, long term security
     EdgeWave
By: IBM     Published Date: Dec 30, 2008
Is your current data warehouse meeting the needs of your business? Take this self-assessment quiz to understand how optimized, simple and flexible your solution is today and learn what next steps are recommended to establish a warehouse solution that can easily grow with your demands and bring greater business value.
Tags : ibm, data warehouse, warehouse assessment tool, warehouse solution, data management
     IBM
By: IBM     Published Date: Oct 09, 2009
Tune into this Web Seminar to hear BPM industry analysts, Dr. Bruce Silver and Amy Lipton share how dynamic BPM powered by the IBM Smart SOATM approach can help you react quickly and drive ROI. After the seminar you'll receive a complimentary IBM BPM assessment for a targeted analysis of your current situation.
Tags : smart soatm, ibm, service oriented architecture, soa, bpm assessment, business process management
     IBM
By: IBM     Published Date: Oct 28, 2009
The five-minute Maintenance & Technology Service Self-Assessment from IBM can help you start addressing the shortfalls in your hardware, software and managed support areas. You'll learn how to create plans for potential issues, plus identify next steps to improve your support.
Tags : infrastructure, ibm, vendor management, vendor assessment, maintenance, technical support
     IBM
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
     IBM
By: Melissa Data     Published Date: Nov 18, 2008
Learn what a Web Service is and how it works, the advantages of using a Data Quality Web Service, the technology assessment for implementation, and several case studies (Saab and other real world case studies) to demonstrate real life successes.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
     Melissa Data
By: Progress Software Corporation CEP     Published Date: Oct 23, 2009
IDC Report: Complex Event Processing Opportunity Analysis and Assessment of Key Products Read this excerpt of the 2009 IDC study by Maureen Fleming and Jeff Silverstein looking at complex event processing. The excerpt includes IDC opinion on the market for CEP, what defines CEP and independently profiles Progress Apama, which was ranked "Top CEP Innovator" in the report.
Tags : progress software, idc, complex event processing, business intelligence, cep, mom
     Progress Software Corporation CEP
By: Progress Software BTA Financial     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
     Progress Software BTA Financial
By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
     Progress Software BTA Telecommunications
By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
     Tripwire, Inc
By: IBM Software     Published Date: Nov 04, 2010
Read this Harvard Business Review article to learn how smart organizations are improving decision-making by identifying and prioritizing decisions; examining factors involved in each decision; designing roles, processes, systems and behaviors to improve decisions; and institutionalizing the new approach through training, refined data analysis, and outcome assessment.
Tags : ibm cognos, harvard business review, data analysis, decision management
     IBM Software
By: HP Intel     Published Date: Sep 15, 2010
See Paul's checklist for assessing your data center needs for today - and for the future of your business.
Tags : hp intel, upgrade data center, hardware assessment, server age, storage, computing power, cooling system
     HP Intel
By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
     Lumension
By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
     Lumension
By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security
     Lumension
By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
     Lumension
By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
     Lumension
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com