IT Management  >   Systems Operations  >   Security  >  

Computer Audits

RSS Feed    Add to Google    Add to My Yahoo!
Computer Audits White Papers (View All Report Types)
 
IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
sponsored by IBM
WHITE PAPER: Discover how the IBM Security zSecure suite contains the components you need to manage your mainframe, monitor for threats, audit usage and configurations, and enforce policies to ensure compliance.
Posted: 08 Mar 2013 | Published: 31 Aug 2011

IBM

The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements
sponsored by Axway
WHITE PAPER: This report divulges the results of a recent survey of executive-level IT buyers around the world regarding their ability to govern the flow of their enterprise data.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

Axway

Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
sponsored by XTS
WHITE PAPER: This white paper provides an analytical perspective on how to best manage your Citrix environment.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

XTS

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
sponsored by IBM
WHITE PAPER: Organizations must implement the right IT GRC controls to meet meet regulatory requirements in areas of specific concern to auditors and reduce operational risk. Learn how IBM provides the capabilities to tackle specific compliance and audit requirements and address issues affecting long-term, ongoing risk management.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

Impact Brief: How to Get Started with Enterprise Risk Management
sponsored by RSA
WHITE PAPER: To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

RSA

Penetration Tests
sponsored by Internet Security Systems, Inc.
WHITE PAPER: A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.
Posted: 06 Apr 2003 | Published: 01 Jan 2001

Internet Security Systems, Inc.

Enabling Continuous PCI DSS Compliance
sponsored by RedSeal Networks
WHITE PAPER: This white paper highlights a proactive security intelligence solution that ensures continuous implementation of the PCI DSS network security requirements and more effective communication of risk to auditors.
Posted: 01 May 2012 | Published: 01 May 2012

RedSeal Networks

Best Practices for Building a Security Operations Center
sponsored by CA Technologies.
WHITE PAPER: In this paper, we explore the business and technical requirements that organizations must consider when implementing a SOC.
Posted: 27 Dec 2006 | Published: 01 Aug 2006

CA Technologies.

Creating a Culture of Change Management
sponsored by Tripwire, Inc.
WHITE PAPER: Download this paper and discover how to create a culture of change management in your organization that mitigates the risk of malicious changes and provides security staff with a reliable, objective view of change across your entire enterprise.
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Top 10 - A Guide to Selecting a SIM Solution for Regulatory Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: This guide has been compiled directly from the experiences of actual customers. These practices should be used as an integral part of your evaluation and selection process
Posted: 25 Jan 2007 | Published: 01 Jan 2007

ArcSight, an HP Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement