Risk Management Whitepapers


Sort by: Date | Company | Title


Benchmarks for Security - A Comparative Test
By Webroot | 5/9/2013
In a head to head comparison of 8 end-point security products, we look at which performs the best across crucial performance metrics - from installation time to memory usage. Download to find out which performs the best!
Download this now


Checking Cloud Service Providers
By Trend Micro | 13/2/2013
In this whitepaper, we look at how to help enterprises overcome the complex data and threat security risks that inhibit them from adopting cloud computing. We find out how enterprise companies need a validated set of trusted security tools that compliments your internal IT controls, helps you overcome fear about cloud security, and enhances your ability to fully embrace cloud computing. Learn more.
Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM | 20/3/2014
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
Download this now


Convincing the Board on Information Governance Software
By Clearswift | 9/8/2013
One of the problems for CIOs today is whether to concentrate on regulatory compliance or information security. The two are bound together since security will provide compliance; but unfortunately, compliance will not necessarily provide security. Compliance is needed to meet legal or regulatory requirements. Security is needed to protect the business. Good governance is what a company needs to ensure both. Find out more on how information governance software is the simplest way for organisations to eliminate risk and communicate with confidence.
Download this now


Critical Conversations: CFO at the Center
By Oracle | 14/12/2010
In this second installment of the Critical Conversations whitepaper series, OCEG describes the conversations a Chief Financial Officer must have with enterprise executives to successfully participate in the development and implementation of an integrated governance, risk management and compliance (GRC) capability that drives Principled Performance. Read on.
Download this now


Critical Conversations: CIO at the Center
By Oracle | 14/12/2010
In the first of a whitepaper series, OCEG describes the conversations a Chief Information Officer must have with enterprise executives to successfully participate in the development and implementation of an integrated governance, risk management and compliance (GRC) capability that drives principled performance. Read on.
Download this now


Critical Conversations: CRO at the Center
By Oracle | 10/12/2010
In this third installment of the Critical Conversations whitepaper series, OCEG describes the conversations a Chief Risk Officer must have with enterprise executives to successfully participate in the development and implementation of an integrated governance, risk management and compliance (GRC) capability that drives Principled Performance.
Download this now


Delivering a Secure Cloud
By Trend Micro | 14/10/2013
In this video, we hear from Sanjay Mehta, Managing Director of Trend Micro, on solutions that allow customers to secure their applications and data, whilst enjoying the benefits of Amazon Web Services Cloud Solutions.
Download this now


Emerging Security Trends and Risks
By IBM | 29/7/2013
Many of the traditional security threats that have been prevalent over the last several years are continuing to evolve and spread. Because it is unrealistic to avoid new connection-enabling technologies, business executives can address emerging security risks by: building a proactive security intelligence capability; developing a unified view of all endpoints, including mobile devices; protecting information assets at the database level; and creating safer social habits. Read on to find out more about these emerging security trends and risks.
Download this now


Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
By Tenable Network Security | 10/3/2014
This report assesses the current state and effectiveness of vulnerability management.
Download this now

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?