IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data AuditsWhite Papers (View All Report Types)
 
Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Next Generation Data Auditing for Data Breach Detection and Risk Mitigation
sponsored by Tizor
WHITE PAPER: This white paper reviews cases of mass data theft from the data source and provides a best practices approach for protecting your organization's sensitive data and valuable brand equity from a major data breach.
Posted: 26 Jan 2007 | Published: 01 Jan 2007

Tizor

Five Fundamental Data Quality Practices
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: This white paper is a list of five data quality practices and how they can be implemented into an organization's daily data quality processes.
Posted: 14 Sep 2011 | Published: 14 Sep 2011

Pitney Bowes Group 1 Software

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort

Practical Guide to Database Security & Compliance
sponsored by Sentrigo Inc.
WHITE PAPER: This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance.
Posted: 05 Nov 2007 | Published: 01 Nov 2007

Sentrigo Inc.

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Preventing Data Loss: 10 Key Imperatives
sponsored by Varonis
WHITE PAPER: This white paper describes the Varonis approach to data protection, which centers on the notion of data governance -- a comprehensive means to see, control and audit all aspects of unstructured data access.
Posted: 10 Sep 2008 | Published: 01 Aug 2007

Varonis

The SANS 2007 Log Management Market Report
sponsored by LogLogic, Inc.
WHITE PAPER: This paper analyzes survey data from 500 IT professionals who were asked about log management, its value, challenges & impact to security & compliance issues. Find what these respondents perceived as beneficial uses of log data & how it's used
Posted: 20 Sep 2007 | Published: 01 Sep 2007

LogLogic, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement