IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data Audits White Papers (View All Report Types)
 
Preventing Data Loss: 10 Key Imperatives
sponsored by Varonis
WHITE PAPER: This white paper describes the Varonis approach to data protection, which centers on the notion of data governance -- a comprehensive means to see, control and audit all aspects of unstructured data access.
Posted: 10 Sep 2008 | Published: 01 Aug 2007

Varonis

The Business Case for Data Access Governance
sponsored by Varonis
WHITE PAPER: This white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
Posted: 01 Sep 2007 | Published: 31 Aug 2007

Varonis

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Five Key Questions Auditors Ask during a Database Compliance Audit
sponsored by Imperva
WHITE PAPER: This paper examines five key questions posed by auditors to confirm compliance with best practices and regulatory mandates. Download this white paper and learn more about how to choose the right database auditing solution for your enterprise.
Posted: 24 Jul 2007 | Published: 01 Jan 2006

Imperva

Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort

Next Generation Data Auditing for Data Breach Detection and Risk Mitigation
sponsored by Tizor
WHITE PAPER: This white paper reviews cases of mass data theft from the data source and provides a best practices approach for protecting your organization's sensitive data and valuable brand equity from a major data breach.
Posted: 26 Jan 2007 | Published: 01 Jan 2007

Tizor

Managing Unstructured Data: 10 Key Requirements
sponsored by Varonis
WHITE PAPER: This white paper takes a practical approach to identifying the right enterprise-wide data protection solution for your specific business. Learn more about these ten imperatives to know when evaluating a vendor offering.
Posted: 10 Sep 2008 | Published: 01 Aug 2007

Varonis

The SANS 2007 Log Management Market Report
sponsored by LogLogic, Inc.
WHITE PAPER: This paper analyzes survey data from 500 IT professionals who were asked about log management, its value, challenges & impact to security & compliance issues. Find what these respondents perceived as beneficial uses of log data & how it's used
Posted: 20 Sep 2007 | Published: 01 Sep 2007

LogLogic, Inc.

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement