IT Management  >   Systems Operations  >   Security  >   Security Audits  >  

Audit Trails

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audit Trail
DEFINITION: In accounting, an audit trail is the sequence of paperwork that validates or invalidates accounting entries. In computing, the term is also used for an electronic or paper log used to trackcomputer activity. Forexample, a corporate employee might have access to a section of a network in acorporation such as billing but be unauthorized to access all other sections. Ifthat employee attempts to access  … 
Definition continues below.
Audit TrailsReports
26 - 50 of 57 Matches Previous Page  | Next Page
The Event Data Warehouse- Strategies for Improving Business Performance
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions.
Posted: 18 Jul 2011 | Published: 18 Jul 2011

Hexis Cyber Solutions Inc

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Securities and capital markets
sponsored by IBM
WHITE PAPER: IBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 09 Jun 2011 | Published: 08 Jun 2011

Dell SecureWorks

 Password Self Help – Password Reset for IBM i
sponsored by Safestone Technologies
WHITE PAPER: Check out this white paper to learn about a self help password application that can give you a high ROI and free up time to work on more business critical issues.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

Safestone Technologies

Best Practices for Mobile Data Protection
sponsored by ArcSight, an HP Company
EGUIDE: This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace the trend toward using personal devices for business.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

ArcSight, an HP Company

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options
sponsored by IBM
EGUIDE: Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization.
Posted: 20 May 2011 | Published: 20 May 2011

IBM

Scalability in Log Management
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper will take you through the process of selecting a log management solution for your organization. It will provide you with information about log management, as well as the requirements you should be looking for in a log management solution.
Posted: 17 May 2011 | Published: 17 May 2011

ArcSight, an HP Company

Is your user management process getting you down? Improving efficiency and security through automation
sponsored by NetIQ Europe
WHITE PAPER: Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access.
Posted: 04 May 2011 | Published: 02 May 2011

NetIQ Europe

Distributed Data Capture: Reducing the Cost of Remote Business Processes
sponsored by Kofax, Inc.
WHITE PAPER: In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Kofax, Inc.

Step by Step: Best practices for security patch management
sponsored by Shavlik Technologies
EGUIDE: Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
Posted: 03 Mar 2011 | Published: 03 Mar 2011

Shavlik Technologies

Top Ten Database Security Threats
sponsored by Imperva
WHITE PAPER: The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Five Signs Your File Data is at Risk
sponsored by Imperva
WHITE PAPER: Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Active Administrator™, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

The Case for Risk-Based, Business-Aligned Internal Audit
sponsored by RSA, The Security Division of EMC
WHITE PAPER: The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

RSA, The Security Division of EMC

Case Study: Fortune 100 Insurance Company and Security Weaver
sponsored by Security Weaver
CASE STUDY: For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
sponsored by IBM
EGUIDE: Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.
Posted: 03 Nov 2010 | Published: 25 Oct 2010

IBM

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions.
Posted: 02 Sep 2010 | Published: 02 Sep 2010

Imperva

ASG-Discovery and Dependency Mapping (ASG-DDM)™
sponsored by ASG Software Solutions
WHITE PAPER: Understanding which hardware and software components support which business systems is extremely difficult. For many years, the clipboard and spreadsheet appear to have been the tools of choice, with the result that many decisions were made based on outdated and inaccurate information. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Presentation Transcript: Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
PRESENTATION TRANSCRIPT: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

PowerTech

Presentation Transcript: Pragmatic Data Security
sponsored by Websense, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript busts through hype, hyperbole, and complexity and details a pragmatic approach to information-centric security for nearly any organization. Read on to learn more.
Posted: 23 Mar 2010 | Published: 22 Mar 2010

Websense, Inc.

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

Securing Virtualized Data Centers
sponsored by Trend Micro, Inc.
EBOOK: On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Trend Micro, Inc.
26 - 50 of 57 Matches Previous Page    1 2 3    Next Page
 
AUDIT TRAILS DEFINITION (continued): …  an unauthorized section by typing in passwords,this improper activity is recorded in the audit trail.Audit trails are used to record customer activity ine-commerce. The customer's initial contact is recorded in an audit trail aswell as each subsequent action such as payment and delivery of the product orservice. The customer's audit trail is then used to respond properly to anyinquiries or complaints. A company might also use an audit trail to provide abasis for account reconciliation, to provide a historical report to plan andsupport budgets, and to provide a record of sales in case of a tax … 
Audit Trails definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement