IT Management  >   Systems Operations  >   Security  >  

Network Security Audits

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Audits Reports
 
Aligning Audit Objectives And Organizations Processes
sponsored by RSA
WHITE PAPER: This infographic lays out a 10 step plan for aligning audit objectives with strategic and operating objectives.  View now to learn more.
Posted: 11 May 2015 | Published: 17 Dec 2014

RSA

Understanding and Selecting a Database Assessment Solution
sponsored by Application Security, Inc.
ANALYST REPORT: In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment.
Posted: 21 Feb 2010 | Published: 22 Feb 2010

Application Security, Inc.

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

E-Book: Technical Guide on Network Security Monitoring
sponsored by SearchMidMarketSecurity
EBOOK: SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.
Posted: 17 May 2010 | Published: 17 May 2010

SearchMidMarketSecurity

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

Insider Edition: There's No Room for Either/Or When It Comes to Cloud and Security
sponsored by SearchSecurity.com
EBOOK: Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.
Posted: 14 May 2014 | Published: 15 May 2014

SearchSecurity.com

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

Panda Security and Minopex - Case Study
sponsored by Panda Security
CASE STUDY: Learn how a mining organization was able to integrate a cloud systems management tool into their existing security solutions to streamline audits, make diagnoses and resolve incidents wherever they are and whenever they arise.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

Panda Security

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options
sponsored by IBM
EGUIDE: Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization.
Posted: 20 May 2011 | Published: 20 May 2011

IBM

Your Enterprise Database Security Strategy (Forrester Consulting Report)
sponsored by IBM
WHITE PAPER: Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization.
Posted: 23 May 2011 | Published: 28 Sep 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement