IT Management  >   Systems Operations  >   Security  >   Security Audits  >  

Audit Trail

RSS Feed    Add to Google    Add to My Yahoo!
Audit TrailWhite Papers (View All Report Types)
 
Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions.
Posted: 02 Sep 2010 | Published: 02 Sep 2010

Imperva

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Configuration Assessment: Choosing the Right Solution
sponsored by Tripwire, Inc.
WHITE PAPER: Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits.
Posted: 08 Jan 2009 | Published: 01 Jul 2008

Tripwire, Inc.

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Top Ten Database Security Threats
sponsored by Imperva
WHITE PAPER: The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Scalability in Log Management
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper will take you through the process of selecting a log management solution for your organization. It will provide you with information about log management, as well as the requirements you should be looking for in a log management solution.
Posted: 17 May 2011 | Published: 17 May 2011

ArcSight, an HP Company

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 09 Jun 2011 | Published: 08 Jun 2011

Dell SecureWorks

Distributed Data Capture: Reducing the Cost of Remote Business Processes
sponsored by Kofax, Inc.
WHITE PAPER: In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Kofax, Inc.

Anatomy of an Archiving Project White Paper
sponsored by IBM
WHITE PAPER: Companies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement