IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data AuditsReports
 
Reduce Costs with Streamlined Information Management
sponsored by Iron Mountain
WHITE PAPER: This white paper reveals how forward-thinking organizations are bringing their growing collection of paper and electronic records under control and realizing considerable cost savings at the same time. Read now to learn more.
Posted: 02 Sep 2012 | Published: 31 Dec 2010

Iron Mountain

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos, Inc.
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos, Inc.

Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort

Presentation Transcript: Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
PRESENTATION TRANSCRIPT: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

PowerTech

Meeting the True Intent of File Integrity Monitoring
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security.
Posted: 29 Oct 2010 | Published: 28 Oct 2010

Tripwire, Inc.

Managing Unstructured Data: 10 Key Requirements
sponsored by Varonis
WHITE PAPER: This white paper takes a practical approach to identifying the right enterprise-wide data protection solution for your specific business. Learn more about these ten imperatives to know when evaluating a vendor offering.
Posted: 10 Sep 2008 | Published: 01 Aug 2007

Varonis

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

Five Fundamental Data Quality Practices
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: This white paper is a list of five data quality practices and how they can be implemented into an organization's daily data quality processes.
Posted: 14 Sep 2011 | Published: 14 Sep 2011

Pitney Bowes Group 1 Software

Under Armour Improves Performance of SAP Data Loading with Winshuttle
sponsored by Winshuttle, LLC
CASE STUDY: Winshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

Winshuttle, LLC

Database Auditing Tools and Strategies
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This paper is to introduce the current options available for database auditing and trade-offs using each.
Posted: 10 Nov 2008 | Published: 30 Oct 2008

Hexis Cyber Solutions Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement