IT Management  >   Systems Operations  >   Security  >   Security Audits  >  

Audit Trail

RSS Feed    Add to Google    Add to My Yahoo!
Audit Trail Multimedia (View All Report Types)
 
Strategies to Survive Software Asset Management Audits
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

Active Administratorâ„¢, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administratorâ„¢ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

Novartis AG Success Story: How Novartis Increased Disposition Capabilities Ten-fold
sponsored by IBM
VIDEO: One of the top expenses of healthcare company Novartis is over-retention of records. This case study details the data retention solution they adopted that helped them improve their records management strategy. View now to learn more!
Posted: 26 Jul 2013 | Premiered: 26 Jul 2013

IBM

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

Assess Database Vulnerabilities and Eliminate Risk
sponsored by IBM
VIDEO: This video introduces a vulnerability assessment solution that utilizes in-depth evaluations to examine patch levels and database configurations, highlighting vulnerabilities in your environment so you can quickly remediate problems and safeguard your critical data.
Posted: 30 Jan 2015 | Premiered: 11 Nov 2014

IBM

Envisioning and Enabling the Next Generation Enterprise
sponsored by Jive Software
WEBCAST: This webcast covers what it takes to envision and enable a next generation enterprise by considering much of the new technology that is flowing through the market. Learn how the CIO must change and adapt to meet new technology pressures and ultimately, give way to the next generation enterprise.
Posted: 17 Feb 2015 | Premiered: Feb 17, 2015

Jive Software

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

Hospitals Deliver a Secure, Mobile Workspace to Their Staff with VDI
sponsored by Dell, Inc.
VIDEO: Inside this video, discover how they implemented a desktop virtualization solution to deliver secure virtual desktops to their clinicians. Find out how this technology enabled easy, rapid login while securing sessions so they could move around and switch to different workstations seamlessly.
Posted: 20 Mar 2015 | Premiered: 20 Feb 2015

Dell, Inc.

Hospital La Fe Uses Vworkspace to Improve Security and It Maintenance
sponsored by Dell, Inc.
VIDEO: Access this brief video to see one healthcare organization's journey through administering their virtual desktops with a software solution that deploys and manages desktop virtualization and VDI technologies. Find out how they were able to simplify and automate the management of their VDI while increasing security and easing mobility.
Posted: 20 Mar 2015 | Premiered: 09 Feb 2015

Dell, Inc.

Better Defend Your Network with Better Anti-Malware
sponsored by Threat Track Security
WEBCAST: This webcast gives you the details on a comprehensive, reliable anti-malware system.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

Threat Track Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement