IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data AuditsWhite Papers (View All Report Types)
 
Airlines Have the Highest Standards for Compliance - Airlines’ Sky-High Data Volumes Need Down-to-Earth Protection
sponsored by Peak 10
WHITE PAPER: This article focuses on the compliance challenges that airlines face from the various groups monitoring them and the concerns they have about the widespread use of personally identifiable information (PII).
Posted: 20 Mar 2014 | Published: 03 Mar 2014

Peak 10

The Lowdown on Compliant Data Storage
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 10 keys to staying compliant. Learn about the importance of access and authorization controls, discover the benefits of encryption for backups, learn how to safeguard traveling media and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos, Inc.
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos, Inc.

Big Data in Motion: Getting The Data To Where It’s Needed
sponsored by EMC Isilon
WHITE PAPER: Big data is great, but how do you get it all to the analytical engines? Read this white paper to learn how to start getting big data to where it's needed.
Posted: 25 Jan 2013 | Published: 31 Dec 2012

EMC Isilon

Preventing Data Loss: 10 Key Imperatives
sponsored by Varonis
WHITE PAPER: This white paper describes the Varonis approach to data protection, which centers on the notion of data governance -- a comprehensive means to see, control and audit all aspects of unstructured data access.
Posted: 10 Sep 2008 | Published: 01 Aug 2007

Varonis

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Database Auditing Tools and Strategies
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This paper is to introduce the current options available for database auditing and trade-offs using each.
Posted: 10 Nov 2008 | Published: 30 Oct 2008

Hexis Cyber Solutions Inc

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault

Managing Unstructured Data: 10 Key Requirements
sponsored by Varonis
WHITE PAPER: This white paper takes a practical approach to identifying the right enterprise-wide data protection solution for your specific business. Learn more about these ten imperatives to know when evaluating a vendor offering.
Posted: 10 Sep 2008 | Published: 01 Aug 2007

Varonis

Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement