IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data Audits White Papers (View All Report Types)
 
Breaking Away from the Vicious Vendor Audit Cycle
sponsored by BDNA
WHITE PAPER: In this white paper, learn about six key ways that you can prepare and navigate a vendor audit, access some of the pitfalls of license management, get clarification on how your enterprise should operate in a post-audit world, and more.
Posted: 10 Nov 2016 | Published: 01 Oct 2016

BDNA

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Database Auditing Tools and Strategies
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This paper is to introduce the current options available for database auditing and trade-offs using each.
Posted: 10 Nov 2008 | Published: 30 Oct 2008

Hexis Cyber Solutions Inc

Practical Guide to Database Security & Compliance
sponsored by Sentrigo Inc.
WHITE PAPER: This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance.
Posted: 05 Nov 2007 | Published: 01 Nov 2007

Sentrigo Inc.

The SANS 2007 Log Management Market Report
sponsored by LogLogic, Inc.
WHITE PAPER: This paper analyzes survey data from 500 IT professionals who were asked about log management, its value, challenges & impact to security & compliance issues. Find what these respondents perceived as beneficial uses of log data & how it's used
Posted: 20 Sep 2007 | Published: 01 Sep 2007

LogLogic, Inc.

Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos, Inc.
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos, Inc.

Next Generation Data Auditing for Data Breach Detection and Risk Mitigation
sponsored by Tizor
WHITE PAPER: This white paper reviews cases of mass data theft from the data source and provides a best practices approach for protecting your organization's sensitive data and valuable brand equity from a major data breach.
Posted: 26 Jan 2007 | Published: 01 Jan 2007

Tizor

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement