IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data Audits White Papers (View All Report Types)
Security Controls Oversight for Sarbanes-Oxley Audit and Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: Download this white paper and learn how ensure your company's compliant with a security management strategy that enables you centrally collect, store, monitor and display security event data.
Posted: 24 Jan 2007 | Published: 01 Dec 2006

ArcSight, an HP Company

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by Commvault
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014


Whitepaper: Control Application Data Growth Before It Controls Your Business
sponsored by IBM
WHITE PAPER: Businesses rely on ERP and CRM applications which collects information from a variety of sources to support business operations. This paper describes some ways organizations can address data growth issues through the power of enterprise data managemt.
Posted: 05 Dec 2008 | Published: 05 Dec 2008


Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006


Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Preventing Data Loss: 10 Key Imperatives
sponsored by Varonis
WHITE PAPER: This white paper describes the Varonis approach to data protection, which centers on the notion of data governance -- a comprehensive means to see, control and audit all aspects of unstructured data access.
Posted: 10 Sep 2008 | Published: 01 Aug 2007


Managing Unstructured Data: 10 Key Requirements
sponsored by Varonis
WHITE PAPER: This white paper takes a practical approach to identifying the right enterprise-wide data protection solution for your specific business. Learn more about these ten imperatives to know when evaluating a vendor offering.
Posted: 10 Sep 2008 | Published: 01 Aug 2007


System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013


Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

Database Auditing Tools and Strategies
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This paper is to introduce the current options available for database auditing and trade-offs using each.
Posted: 10 Nov 2008 | Published: 30 Oct 2008

Hexis Cyber Solutions Inc
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement