IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data AuditsWhite Papers (View All Report Types)
 
Reduce Costs with Streamlined Information Management
sponsored by Iron Mountain
WHITE PAPER: This white paper reveals how forward-thinking organizations are bringing their growing collection of paper and electronic records under control and realizing considerable cost savings at the same time. Read now to learn more.
Posted: 02 Sep 2012 | Published: 31 Dec 2010

Iron Mountain

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault

The SANS 2007 Log Management Market Report
sponsored by LogLogic, Inc.
WHITE PAPER: This paper analyzes survey data from 500 IT professionals who were asked about log management, its value, challenges & impact to security & compliance issues. Find what these respondents perceived as beneficial uses of log data & how it's used
Posted: 20 Sep 2007 | Published: 01 Sep 2007

LogLogic, Inc.

Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos, Inc.
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos, Inc.

Next Generation Data Auditing for Data Breach Detection and Risk Mitigation
sponsored by Tizor
WHITE PAPER: This white paper reviews cases of mass data theft from the data source and provides a best practices approach for protecting your organization's sensitive data and valuable brand equity from a major data breach.
Posted: 26 Jan 2007 | Published: 01 Jan 2007

Tizor

Five Key Questions Auditors Ask during a Database Compliance Audit
sponsored by Imperva
WHITE PAPER: This paper examines five key questions posed by auditors to confirm compliance with best practices and regulatory mandates. Download this white paper and learn more about how to choose the right database auditing solution for your enterprise.
Posted: 24 Jul 2007 | Published: 01 Jan 2006

Imperva

Whitepaper: Control Application Data Growth Before It Controls Your Business
sponsored by IBM
WHITE PAPER: Businesses rely on ERP and CRM applications which collects information from a variety of sources to support business operations. This paper describes some ways organizations can address data growth issues through the power of enterprise data managemt.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

IBM

Security Controls Oversight for Sarbanes-Oxley Audit and Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: Download this white paper and learn how ensure your company's compliant with a security management strategy that enables you centrally collect, store, monitor and display security event data.
Posted: 24 Jan 2007 | Published: 01 Dec 2006

ArcSight, an HP Company

Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement