IT Management  >   Systems Operations  >   Security  >  

Auditing (Computer Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing (Computer Security) Reports
 
Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Avoiding 7 Common Mistakes of IT Security Compliance
sponsored by Qualys, Inc.
EGUIDE: This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals.
Posted: 21 Oct 2009 | Published: 01 Apr 2009

Qualys, Inc.

Enabling Continuous PCI DSS Compliance
sponsored by RedSeal Networks
WHITE PAPER: This white paper highlights a proactive security intelligence solution that ensures continuous implementation of the PCI DSS network security requirements and more effective communication of risk to auditors.
Posted: 01 May 2012 | Published: 01 May 2012

RedSeal Networks

The Forrester Wave™: Risk-Based Authentication, Q1 2012
sponsored by RSA
WHITE PAPER: This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more.
Posted: 02 Apr 2012 | Published: 22 Feb 2012

RSA

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
sponsored by Symantec Corporation
WEBCAST: View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
sponsored by IBM
EGUIDE: Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.
Posted: 03 Nov 2010 | Published: 25 Oct 2010

IBM

Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER: This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009

Symantec Corporation

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement