IT Management  >   Systems Operations  >   Security  >   Security Audits  >  

Audit Trail

RSS Feed    Add to Google    Add to My Yahoo!
Audit Trail Reports
Case Study: Fortune 100 Insurance Company and Security Weaver
sponsored by Security Weaver
CASE STUDY: For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options
sponsored by IBM
EGUIDE: Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization.
Posted: 20 May 2011 | Published: 20 May 2011


Presentation Transcript: Pragmatic Data Security
sponsored by Websense, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript busts through hype, hyperbole, and complexity and details a pragmatic approach to information-centric security for nearly any organization. Read on to learn more.
Posted: 23 Mar 2010 | Published: 22 Mar 2010

Websense, Inc.

The Event Data Warehouse- Strategies for Improving Business Performance
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions.
Posted: 18 Jul 2011 | Published: 18 Jul 2011

Hexis Cyber Solutions Inc

Securities and capital markets
sponsored by IBM
WHITE PAPER: IBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems.
Posted: 07 Jul 2011 | Published: 07 Jul 2011


Unifying Management of Physical and Electronic Records: The Records Management Imperative
sponsored by EMC Corporation
WHITE PAPER: This white paper explains the features and benefits of such a unified approach to enterprise records management, and describes how the EMC Documentum/OmniRIM solution works.
Posted: 13 Mar 2008 | Published: 01 Feb 2007

EMC Corporation

What Changed? Leveraging the Power of Change Auditing
sponsored by Tripwire, Inc.
PRODUCT OVERVIEW: Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed.
Posted: 30 Mar 2009 | Published: 31 Dec 2008

Tripwire, Inc.

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

The Challenges - and Myths - of Sarbanes-Oxley Compliance
sponsored by Bytware, Inc.
WHITE PAPER: This white paper addresses the challenges and dispels the myths associated with SOX compliance in iSeries (System i) shops. It also examines the 5 steps to take toward compliance, and how to achieve CobiT objectives such as risk assessment and more.
Posted: 29 Nov 2006 | Published: 30 Aug 2004

Bytware, Inc.

Securing Virtualized Data Centers
sponsored by Trend Micro, Inc.
EBOOK: On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Trend Micro, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement