IT Management  >   Systems Operations  >   Security  >  

Auditing (Computer Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing (Computer Security) Reports
 
How Customers Can Use the SOC 2 Audit
sponsored by Citrix
RESOURCE: The SOC 2 report provides third-party assurance that the design, internal processes, and controls of your EFSS service meet the SOC 2 standards for security, availability, confidentiality, and privacy. Does your provider make the cut?
Posted: 16 May 2016 | Published: 10 Mar 2016

Citrix

Security Big Data: Preparing for a Big Data Collection Implementation
sponsored by SearchSecurity.com
EBOOK: This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
Posted: 13 Jun 2013 | Published: 13 Jun 2013

SearchSecurity.com

Creating a Compliance Culture: Best Practices
sponsored by SearchSecurity.com
EGUIDE: Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

Mobility In Financial Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BlackBerry

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

GlobalSCAPE’s Cloud-based Managed File Transfer Solution Helps AVI-SPL Streamline Global Operations
sponsored by GlobalScape
CASE STUDY: In this case study you will learn how GlobalSCAPE's cloud-based manged file transfer solution was able to help one business tremendously. Not only will you get insight into the different benefits of the solution, but you will also find out why GlobalSCAPE comes highly recommended due to customer service as well.
Posted: 08 Jul 2011 | Published: 07 Jul 2011

GlobalScape

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention
sponsored by Intel Security
WHITE PAPER: While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Intel Security

Security trends in the manufacturing industry
sponsored by IBM
WHITE PAPER: This white paper shows you statistics about cyberattack in the manufacturing industry and how they resulted. Learn some manufacturing best practices and securements to better protect any exploitable weaknesses in your organization's infrastructure.
Posted: 16 Mar 2016 | Published: 29 Feb 2016

IBM

Barclays Application Security Assurance Project
sponsored by Veracode, Inc.
CASE STUDY: As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Veracode, Inc.

Get the Message: Why Secure Texting Matters
sponsored by SearchHealthIT.com
EBOOK: Texting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchHealthIT.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement