IT Management  >   Systems Operations  >   Security  >   Security Audits  >  

Audit Trail

RSS Feed    Add to Google    Add to My Yahoo!
Audit Trail Multimedia (View All Report Types)
 
Novartis AG Success Story: How Novartis Increased Disposition Capabilities Ten-fold
sponsored by IBM
VIDEO: One of the top expenses of healthcare company Novartis is over-retention of records. This case study details the data retention solution they adopted that helped them improve their records management strategy. View now to learn more!
Posted: 26 Jul 2013 | Premiered: 26 Jul 2013

IBM

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

Active Administrator™, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

Strategies to Survive Software Asset Management Audits
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

Don't Get Taken for a Ride: Finding the Right Hyperconverged Solution
sponsored by HPE and Intel®
VIDEO: Tune into this video to find out how implementing a hyperconverged system in your data center can simplify and speed your IT infrastructure while lowering costs and accelerating the pace of your business. View now to use HCI to quickly add capacity to your infrastructure, and manage the rollercoaster of demands in today's digital economy.
Posted: 23 Jun 2016 | Premiered: 30 May 2016

HPE and Intel®

Data loss prevention and enterprise file sync and sharing: is your data safe?
sponsored by Citrix
WEBCAST: Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.
Posted: 06 May 2016 | Premiered: May 13, 2015

Citrix

Closing the Cybersecurity Gap
sponsored by Palo Alto Networks
WEBCAST: This webcast assesses the growing risk that hackers pose to your enterprise. Watch now to learn about improving your overall security response, from advanced detection tools to creating safer networks that are more immune to attack.
Posted: 12 Apr 2016 | Premiered: Apr 12, 2016

Palo Alto Networks

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

Key Findings on Endpoint Security and Real-Time Prevention
sponsored by Palo Alto Networks
WEBCAST: This webinar contains the results of a study aimed at revealing which security strategies are most effective at dealing with today's dangerous array of cyber-threats.
Posted: 15 Apr 2016 | Premiered: Oct 30, 2015

Palo Alto Networks

Hackers Aren't As Picky As You Think
sponsored by Verizon
VIDEO: Discover the first truth of network security: That malicious actors are mostly out for low hanging fruit. With the resources found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.
Posted: 24 Jun 2016 | Premiered: 28 Apr 2016

Verizon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement