IT Management  >   Systems Operations  >   Security  >  

IT Security Audits

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Audits Reports
 
E-Guide: Evaluating cloud security concerns
sponsored by SearchSecurity.com
EGUIDE: The benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

SearchSecurity.com

5 Steps to Effective Log Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is an excellent resource for IT security executives, providing 5 steps that enterprises should take in designing a more effective log management strategy.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks

Lending Tools Streamlines Over 1,100 File Transfer Tasks with MOVEit
sponsored by Ipswitch File Transfer
CASE STUDY: This case study details the solution LendingTools.com put in place that provided the file management and automation they need to manage, automate, secure, and monitor large volumes of data for their customers. View now to learn more!
Posted: 15 Jul 2013 | Published: 28 Jun 2013

Ipswitch File Transfer

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension

Log Management and SIEM: Build a Solid Foundation for Compliance
sponsored by McAfee, Inc.
EGUIDE: This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

McAfee, Inc.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave

Impact Brief: How to Get Started with Enterprise Risk Management
sponsored by RSA
WHITE PAPER: To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

RSA

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Safe & Secure: An Overview of Security Features In JBoss Application Platforms
sponsored by Red Hat
WEBCAST: Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
Posted: 08 Jul 2010 | Premiered: Jul 8, 2010

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement