IT Management  >   Systems Operations  >   Security  >  

Computer Audits

RSS Feed    Add to Google    Add to My Yahoo!
Computer AuditsWhite Papers (View All Report Types)
 
Audits, Compliance and Security: ITPros share their experience
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper talks about a solution that allows users to better track and audit malicious or unintentional changes to their Windows environment. It gives interviews with users from various industries to see how the solution worked for them.
Posted: 10 Mar 2014 | Published: 07 Mar 2014

Dell, Inc.

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC

Seven Considerations for Achieving CJIS Compliance
sponsored by Imprivata
WHITE PAPER: This white paper features a security solution that helps you ensure the Criminal Justice Information Services (CJIS) compliance requirement for advanced authentication is met by your organization, effective on September 30, 2014.
Posted: 14 Apr 2014 | Published: 31 Oct 2013

Imprivata

The CISO's Guide to a Full Night's Sleep
sponsored by EMC Corporation
WHITE PAPER: This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

EMC Corporation

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and in compliant with varying compliance mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Ease GLBA Compliance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER: This paper introduces 10 of the most important reports and uses reports generated by Qualys' vulnerability management solution, QualysGuard, for reference purposes. The reports are organized across the four key steps in the vulnerability management lifecycle.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Qualys

PCI Compliance: Are UK Businesses Ready?
sponsored by Tripwire, Inc.
WHITE PAPER: As of September 30, 2010, the Payment Card Industry Data Security Standard (PCI DSS) will apply to organizations in the UK. Recent research reveals that so far only 12 percent of UK organizations that handle credit card data currently have been certified PCI compliant. Read on to learn how your organization should be preparing for September 30th.
Posted: 09 Apr 2010 | Published: 09 Apr 2010

Tripwire, Inc.

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

McAfee, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement