IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 
Definition continues below.
Security AuditsWhite Papers (View All Report Types)
51 - 61 of 61 Matches Previous Page  |  Next Page
Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Creating a Culture of Change Management
sponsored by Tripwire, Inc.
WHITE PAPER: Download this paper and discover how to create a culture of change management in your organization that mitigates the risk of malicious changes and provides security staff with a reliable, objective view of change across your entire enterprise.
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Connect Users Any Time, Everywhere-with Secure, Affordable Business IM
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) improves productivity by enabling employees to communicate information directly from their desktops. Read this paper to learn how to improve collaboration while allowing for security, compliance and centralized administration.
Posted: 16 Feb 2007 | Published: 01 Feb 2007

WebEx Communications, Inc.

Business-Class Security and Compliance for On-Demand Instant Messaging
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM.
Posted: 16 Feb 2007 | Published: 01 Dec 2006

WebEx Communications, Inc.

Top 10 - A Guide to Selecting a SIM Solution for Regulatory Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: This guide has been compiled directly from the experiences of actual customers. These practices should be used as an integral part of your evaluation and selection process
Posted: 25 Jan 2007 | Published: 01 Jan 2007

ArcSight, an HP Company

Security Controls Oversight for Sarbanes-Oxley Audit and Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: Download this white paper and learn how ensure your company's compliant with a security management strategy that enables you centrally collect, store, monitor and display security event data.
Posted: 24 Jan 2007 | Published: 01 Dec 2006

ArcSight, an HP Company

Best Practices for Building a Security Operations Center
sponsored by CA Technologies.
WHITE PAPER: In this paper, we explore the business and technical requirements that organizations must consider when implementing a SOC.
Posted: 27 Dec 2006 | Published: 01 Aug 2006

CA Technologies.

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

An Introduction to Network Vulnerability Testing
sponsored by VeriSign, Inc
WHITE PAPER: SecureTEST, a security scanning service of VeriSign Consulting, uses proven methodologies and tools to detect vulnerabilities in the enterprise's network, and to then recommend repairs or corrections if necessary.
Posted: 14 May 2003 | Published: 01 Jan 2001

VeriSign, Inc

Penetration Tests
sponsored by Internet Security Systems, Inc.
WHITE PAPER: A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.
Posted: 06 Apr 2003 | Published: 01 Jan 2001

Internet Security Systems, Inc.
51 - 61 of 61 Matches Previous Page    1 2 3    Next Page
 
SECURITY AUDITS DEFINITION (continued): …  wake of legislation (such as HIPAA, the Sarbanes-Oxley Act, and the California Security Breach Information Act) that specifies how organizations must deal with information. Learn more about audits at SearchCompliance.com. According to Ira Winkler, president of the Internet Security Advisors Group, security audits, vulnerability assessments, and penetration testing are the three main types of security diagnostics. Each of the three takes a different approach and may be best suited for a particular purpose. Security audits measure an information system's performance against a list of criteria. … 
Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement