IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data Audits Reports
 
Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor

Whitepaper: Control Application Data Growth Before It Controls Your Business
sponsored by IBM
WHITE PAPER: Businesses rely on ERP and CRM applications which collects information from a variety of sources to support business operations. This paper describes some ways organizations can address data growth issues through the power of enterprise data managemt.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

IBM

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Next Generation Data Auditing for Data Breach Detection and Risk Mitigation
sponsored by Tizor
WHITE PAPER: This white paper reviews cases of mass data theft from the data source and provides a best practices approach for protecting your organization's sensitive data and valuable brand equity from a major data breach.
Posted: 26 Jan 2007 | Published: 01 Jan 2007

Tizor

Data De-duplication and Replication Gives AIG Better Backups and Enhanced Sarbanes-Oxley Compliance
sponsored by Quantum Corporation
CASE STUDY: AIG major business challenge was the rapid access to archive data so to overcome this problem AIG tried Quantum backup solutions that combined data de-duplication disk, tape, due to which the company is now able to enhance compliance.
Posted: 12 Jun 2008 | Published: 01 Jun 2008

Quantum Corporation

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

The SANS 2007 Log Management Market Report
sponsored by LogLogic, Inc.
WHITE PAPER: This paper analyzes survey data from 500 IT professionals who were asked about log management, its value, challenges & impact to security & compliance issues. Find what these respondents perceived as beneficial uses of log data & how it's used
Posted: 20 Sep 2007 | Published: 01 Sep 2007

LogLogic, Inc.

The Business Case for Data Access Governance
sponsored by Varonis
WHITE PAPER: This white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
Posted: 01 Sep 2007 | Published: 31 Aug 2007

Varonis

Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement