IT Management  >   Systems Operations  >   Security  >  

Computer Audits

RSS Feed    Add to Google    Add to My Yahoo!
Computer Audits Reports
 
Cloud Access Security Brokers: Critical Capabilities
sponsored by BitGlass
WEBCAST: This video will help you protect your network by providing prospective on the brokers specialized in guarding data over the cloud.
Posted: 12 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave

Log Management and SIEM: Build a Solid Foundation for Compliance
sponsored by Intel Security
EGUIDE: This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Intel Security

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Understanding and Selecting a Database Assessment Solution
sponsored by Application Security, Inc.
ANALYST REPORT: In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment.
Posted: 21 Feb 2010 | Published: 22 Feb 2010

Application Security, Inc.

PCI Compliance: Are UK Businesses Ready?
sponsored by Tripwire, Inc.
WHITE PAPER: As of September 30, 2010, the Payment Card Industry Data Security Standard (PCI DSS) will apply to organizations in the UK. Recent research reveals that so far only 12 percent of UK organizations that handle credit card data currently have been certified PCI compliant. Read on to learn how your organization should be preparing for September 30th.
Posted: 09 Apr 2010 | Published: 09 Apr 2010

Tripwire, Inc.

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
sponsored by IBM
EGUIDE: Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.
Posted: 03 Nov 2010 | Published: 25 Oct 2010

IBM

Barclays Application Security Assurance Project
sponsored by Veracode, Inc.
CASE STUDY: As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Veracode, Inc.

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE: This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement