Business Technology

Results 276 - 300 of 4290Sort Results By: Published Date | Title | Company Name
By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : bitsight, cyber crime, cyber attacks, ransomware, cyber security, security, enterprise applications, business technology
     BitSight Technologies
By: BitSight Technologies     Published Date: May 26, 2016
Does your organization have sensitive data stored across the globe? Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Tags : bitsight, data security, risk management, cybersecurity, vrm practices, risk management, security, enterprise applications, business technology
     BitSight Technologies
By: BitSight Technologies     Published Date: May 26, 2016
With this guide, you’ll never have to wonder about that again. You’ll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications, business technology
     BitSight Technologies
By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : cybersecurity, security risk, security ratings, security, it management, enterprise applications, data management, it career advancement, business technology
     BitSight Technologies
By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : networking, security, it management, knowledge management, enterprise applications, data management, human resource technology, business technology, data center
     BitSight Technologies
By: BitSight Technologies     Published Date: Jan 11, 2016
Why does the cyber security performance of several industries differ? Download the latest BitSight Industry Benchmarking report to find out.
Tags : networking, security, it management, knowledge management, data management, it career advancement, business technology, data center
     BitSight Technologies
By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : networking, security, it management, knowledge management, data management, it career advancement, business technology, data center
     BitSight Technologies
By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : networking, security, it management, data management, human resource technology, it career advancement, business technology
     BitSight Technologies
By: BitSight Technologies     Published Date: Jul 23, 2015
Recent BitSight research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach. Download this report to learn how BitSight Security Ratings are a powerful metric for communicating cyber risk across the enterprise.
Tags : cyber risk, security, data, network, it operations, it management, knowledge management, enterprise applications, it career advancement, business technology
     BitSight Technologies
By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : networking, security, software development, it management, knowledge management, enterprise applications, platforms, storage, data management, it career advancement, electronics, business technology, data center
     BitSight Technologies
By: Bizagi     Published Date: Jun 10, 2016
In a survey of enterprise architects and IT decision makers Forrester found that 67% of those reporting that BPM significantly exceeded their goals had built a COE.
Tags : bizagi, bpm, it decision maker, forrester, enterprise, enterprise architect, business technology
     Bizagi
By: Bizagi     Published Date: Jun 10, 2016
One of the first steps to BPM success is to communicate an accurate business case. While the benefits to the business are often clear, what are the most common factors that drive the total cost of your BPM program?
Tags : bizagi, bpm, business case, bpm solutions, business technology
     Bizagi
By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : black duck, science logic, open source, visibility, secutiry, software, security, enterprise applications, business technology
     Black Duck Software
By: Black Duck Software     Published Date: May 18, 2016
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : black duck, open source, security, security testing tools, software, enterprise applications, business technology
     Black Duck Software
By: Black Duck Software     Published Date: May 18, 2016
Read this report to learn the results from our open source security audits: - How much open source is typically in use - How many commercial applications contain security vulnerabilities in open source - How many open source component vulnerabilities are in each application
Tags : black duck, open source, software, security, security report, enterprise applications, business technology
     Black Duck Software
By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : black duck, application security, security, open source, code, enterprise applications, business technology
     Black Duck Software
By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : black duck, open source, security, security testing tools, software, enterprise applications, business technology
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
     Black Duck Software
By: Blackberry     Published Date: Mar 12, 2013
FIPS, CAPS, AISEP, and many more — BlackBerry® has received certification from the most rigorous security testers in the world. In this insightful webinar, find out what they mean and why they matter to enterprises.
Tags : blackberry security certifications, organization, blackberry 10, webinar, transition, knowledge management, enterprise applications, business technology
     Blackberry
By: Blackberry     Published Date: Mar 12, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : tco, security, enterprise grade mobility, blackberry, blackberry 10, enterprise, knowledge management, enterprise applications, business technology
     Blackberry
By: Blackberry     Published Date: Mar 12, 2013
Ricoh Canada’s Director of Infrastructure and Operations speaks about his enthusiasm for BlackBerry® 10 devices, his findings after testing BlackBerry® Enterprise Service 10, and plans to port a field service application to the new platform.
Tags : enterprise feedback, choosing blackberry 10, ricoh canada, case study, enterprise case study, knowledge management, enterprise applications, business technology
     Blackberry
By: Blackberry     Published Date: Mar 12, 2013
Mobile Computing Corp Inc. (MCC) specializes in mobile field service solutions. After a rigorous trial period, the company’s CEO concluded that “the strength of BlackBerry 10 is great.” Find out what made the experience so positive.
Tags : mobile computing corp, implementing blackberry 10, feedback, enterprise, knowledge management, enterprise applications, business technology
     Blackberry
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com