Assessing Risk White Papers

(View All Report Types)
Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER: This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007

Core Security Technologies

The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability
sponsored by SAP America, Inc.
WHITE PAPER: Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability.
Posted: 22 Jul 2009 | Published: 03 Jun 2009

SAP America, Inc.

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER: This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007

IBM

IBM System x Servers - The Right Choice. Open. Easy. Green
sponsored by IBM
WHITE PAPER: IBMSystemx is a portfolio of robust servers built on IBMX-Architecture's our blueprint for bringing innovation tox86systems. Innovation that helps set you apart from the competition. Learn more in this paper.
Posted: 11 Sep 2008 | Published: 11 Sep 2008

IBM

Hard Hat Area: Myths and Pitfalls of Data Mining
sponsored by SPSS Inc. Worldwide Headquarters
WHITE PAPER: The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

SPSS Inc. Worldwide Headquarters

Addressing the Insider Threat with NetIQ Operational Change Control Solutions
sponsored by SUSE
WHITE PAPER: Download "Addressing the Insider Threat with NetIQ Operational Change Control Solutions" to get the expert advice you need to build a comprehensive management system that reduces and eliminates the risk of an insider threat.
Posted: 09 Aug 2006 | Published: 29 Mar 2006

SUSE

Asset: Healthcare 2015 and U.S. Health Plans New Roles, New Competencies
sponsored by IBM Line of Business
WHITE PAPER: The U.S. healthcare system is on an unsustainable path that will force its transformation.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

IBM Line of Business

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Extend Business Reach with a Robust Security Infrastructure
sponsored by IBM Software Group
WHITE PAPER: This white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.
Posted: 03 Aug 2007 | Published: 01 Jul 2007

IBM Software Group

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects
sponsored by HCL Software
WHITE PAPER: This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool.
Posted: 20 Jun 2008 | Published: 13 Mar 2008

HCL Software