IT Management  >   Systems Operations  >   Security  >  

Network Security Audits

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Audits Reports
 
Creating a Compliance Culture: Best Practices
sponsored by SearchSecurity.com
EGUIDE: Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

How Do Top SIEM Products Compare in Common Client Deployment Scenarios?
sponsored by IBM
WHITE PAPER: This resource from Gartner evaluates vendors' SIEM products and services based on their ability to fulfill users' requirements in the areas of compliance, threat management, and SIEM, helping organizations to select the solution that best fits their particular needs.
Posted: 27 Aug 2014 | Published: 25 Jun 2014

IBM

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
sponsored by IBM
EGUIDE: Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
sponsored by Symantec Corporation
WEBCAST: View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

McAfee, Inc.

Effective Log Management for the IBM Power Systems (i, AIX, Linux)
sponsored by Safestone Technologies
WHITE PAPER: This paper will discuss the benefits of using a log management solution to ensure compliance in virtual environments and the features a good solution should provide your organization.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

Computer Weekly – 2 April 2013: The benefits of context-aware security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement