Standards  >   Security Standards  >  

Control Objectives for Information and Related Technology

RSS Feed    Add to Google    Add to My Yahoo!
Control Objectives for Information and Related TechnologyReports
 
COBIT5 For Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is a preview of a  report from ISACA offering guidance on how to use the COBIT 5 framework to establish the risk governance and management functions for the enterprise.
Posted: 01 Nov 2013 | Published: 19 Nov 2013

ComputerWeekly.com

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
sponsored by Tripwire, Inc.
WHITE PAPER: To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance.
Posted: 08 Jan 2009 | Published: 08 Jan 2008

Tripwire, Inc.

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance
sponsored by Varonis
WHITE PAPER: This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Varonis

Configuration Assessment: Choosing the Right Solution
sponsored by Tripwire, Inc.
WHITE PAPER: Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits.
Posted: 08 Jan 2009 | Published: 01 Jul 2008

Tripwire, Inc.

A Guide to Keeping E-mail Legal: Four Pillars of Compliance
sponsored by SonicWALL
WHITE PAPER: This paper provides guidance on how to keep your company use of e-mail systems legal, without interrupting basic business processes. It also explains the compliance requirements that affect e-mail systems.
Posted: 29 Aug 2006 | Published: 01 Aug 2006

SonicWALL

The IT Manager's Working Guide to Sustainable SOX Compliance
sponsored by SoftLanding Systems, Inc.
WHITE PAPER: Learn how to overcome real-world compliance challenges and optimize your SOX efforts. Packed with NEW resources, tips, and a SOX-specific list of COBIT 4.0 objectives, this paper offers actionable tactics to help IT departments achi...
Posted: 02 Oct 2006 | Published: 01 Aug 2006

SoftLanding Systems, Inc.

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
sponsored by SearchSecurity.com
EBOOK: Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

SearchSecurity.com

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis...
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

The State of System i Security 2007
sponsored by PowerTech
WHITE PAPER: This study highlights a number of very common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the AS/400.
Posted: 16 Apr 2007 | Published: 01 Apr 2007

PowerTech
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement