IT Management  >   Systems Operations  >   Security  >  

Auditing (Computer Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing (Computer Security)Reports
 
Case Study: Novagalicia Secures Critical Applications with HP Fortify
sponsored by Hewlett-Packard Limited
CASE STUDY: Assessing and improving the security of applications used in financial institutions is paramount. This case study explores the security-as-a-service (SaaS) testing solution one bank used after a merger to quickly and accurately assess their nearly 400 applications. View now to learn more!
Posted: 06 May 2013 | Published: 30 Apr 2013

Hewlett-Packard Limited

Endpoint Security Compliance: Top 19 Questions Auditors Ask
sponsored by Lumension
WEBCAST: This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time.
Posted: 11 Apr 2014 | Premiered: Apr 11, 2014

Lumension

PCI DSS Simplified: What You Need to Know
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013

AlienVault

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
sponsored by IBM
WHITE PAPER: Organizations must implement the right IT GRC controls to meet meet regulatory requirements in areas of specific concern to auditors and reduce operational risk. Learn how IBM provides the capabilities to tackle specific compliance and audit requirements and address issues affecting long-term, ongoing risk management.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance
sponsored by Ipswitch File Transfer
CASE STUDY: This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
Posted: 09 Jul 2013 | Published: 31 May 2013

Ipswitch File Transfer

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute Software
WHITE PAPER: In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
Posted: 21 Jan 2014 | Published: 15 Jan 2013

Absolute Software

E-Book: Technical Guide on Network Security Monitoring
sponsored by SearchMidMarketSecurity
EBOOK: SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.
Posted: 17 May 2010 | Published: 17 May 2010

SearchMidMarketSecurity

E-Guide: Evaluating cloud security concerns
sponsored by CA Technologies
EGUIDE: The benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

CA Technologies

Understanding the Reasons Behind Data Loss Disasters
sponsored by Websense, Inc.
WHITE PAPER: While the importance of establishing the right IT systems and security policies have been expressed time and time again, a quick glance at the news headlines on data disasters reveal that not all organizations have a grasp on data leak protection. View this paper to explore some data loss incidents and the key leassons learned.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

Websense, Inc.

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement