IT Management  >   Systems Operations  >   Security  >  

Auditing (Computer Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing (Computer Security)Reports
 
Keep Cloud Compliant
sponsored by SearchCompliance.com
EBOOK: Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchCompliance.com

Lending Tools Streamlines Over 1,100 File Transfer Tasks with MOVEit
sponsored by Ipswitch File Transfer
CASE STUDY: This case study details the solution LendingTools.com put in place that provided the file management and automation they need to manage, automate, secure, and monitor large volumes of data for their customers. View now to learn more!
Posted: 15 Jul 2013 | Published: 28 Jun 2013

Ipswitch File Transfer

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention
sponsored by McAfee, Inc.
WHITE PAPER: While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.  
Posted: 04 Nov 2011 | Published: 04 Nov 2011

McAfee, Inc.

Impact Brief: How to Get Started with Enterprise Risk Management
sponsored by RSA, The Security Division of EMC
WHITE PAPER: To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

RSA, The Security Division of EMC

Enabling Continuous PCI DSS Compliance
sponsored by RedSeal Networks
WHITE PAPER: This white paper highlights a proactive security intelligence solution that ensures continuous implementation of the PCI DSS network security requirements and more effective communication of risk to auditors.
Posted: 01 May 2012 | Published: 01 May 2012

RedSeal Networks

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

What Auditors Think about CryptoTechnologies
sponsored by Thales
WHITE PAPER: This white paper explains why auditor input should be incorporated into an organization’s security strategy. Find out why encryption is the preferred data protection technology and access results from a recent survey on the current state of compliance across today’s enterprises.
Posted: 12 Apr 2011 | Published: 11 Apr 2011

Thales

AGESIC (Uraguay)
sponsored by IBM
CASE STUDY: Working with IBM and IBM® Business Partner Urudata Software, AGESIC has implemented a multitier architecture that provides a comprehensive security solution for e-government services and addresses transport security, access control and identity management.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Your Enterprise Database Security Strategy (Forrester Consulting Report)
sponsored by IBM
WHITE PAPER: Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization.
Posted: 23 May 2011 | Published: 28 Sep 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement