IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 
Definition continues below.
Security AuditsReports
101 - 125 of 130 Matches Previous Page  | Next Page
What Changed? Leveraging the Power of Change Auditing
sponsored by Tripwire, Inc.
PRODUCT OVERVIEW: Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed.
Posted: 30 Mar 2009 | Published: 31 Dec 2008

Tripwire, Inc.

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams
sponsored by Qualys, Inc.
WHITE PAPER: This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Qualys, Inc.

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE: This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies

Applications, Virtualization, and Devices: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important to control unauthorized applications and devices, discusses the different approaches and highlights how integrating this functionality into malware protection is the simplest and cost-effective solution.
Posted: 02 Oct 2008 | Published: 23 Sep 2008

Sophos, Inc.

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance
sponsored by Linoma Software
CASE STUDY: In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
sponsored by XTS
WHITE PAPER: This white paper provides an analytical perspective on how to best manage your Citrix environment.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

XTS

Manage Risk and Address Return on Investment with IBM Compliance Solutions
sponsored by IBM Software Group
WHITE PAPER: Governance, risk management and compliance place high expectations on IT to establish, enforce and prove the efficacy of policies, processes and controls.
Posted: 15 Feb 2008 | Published: 01 Mar 2007

IBM Software Group

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

GFI PCI Suite
sponsored by GFI Software
TRIAL SOFTWARE: The GFI PCI Suite is a package comprising the core software required for PCI DSS compliance.
Posted: 22 Jun 2007 | Premiered: 01 Jun 2007

GFI Software

GFI LANguard Network Security Scanner 8
sponsored by GFI Software
TRIAL SOFTWARE: GFI LANguard Network Security Scanner 8 is a network vulnerability management solution that scans the network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides tools to patch and secure networks.
Posted: 19 Apr 2007 | Premiered: 19 Apr 2007

GFI Software

The State of System i Security 2007
sponsored by PowerTech
WHITE PAPER: This study highlights a number of very common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the AS/400.
Posted: 16 Apr 2007 | Published: 01 Apr 2007

PowerTech

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Gone in a Flash
sponsored by Information Security Magazine
JOURNAL ARTICLE: From USB drives to MP3 players to DVDs, portable storage media are an end user's dream and a security manager's nightmare. We evaluated six device control tools that can help you rest easier.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Information Security Magazine

Creating a Culture of Change Management
sponsored by Tripwire, Inc.
WHITE PAPER: Download this paper and discover how to create a culture of change management in your organization that mitigates the risk of malicious changes and provides security staff with a reliable, objective view of change across your entire enterprise.
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Connect Users Any Time, Everywhere-with Secure, Affordable Business IM
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) improves productivity by enabling employees to communicate information directly from their desktops. Read this paper to learn how to improve collaboration while allowing for security, compliance and centralized administration.
Posted: 16 Feb 2007 | Published: 01 Feb 2007

WebEx Communications, Inc.

Business-Class Security and Compliance for On-Demand Instant Messaging
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM.
Posted: 16 Feb 2007 | Published: 01 Dec 2006

WebEx Communications, Inc.

Top 10 - A Guide to Selecting a SIM Solution for Regulatory Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: This guide has been compiled directly from the experiences of actual customers. These practices should be used as an integral part of your evaluation and selection process
Posted: 25 Jan 2007 | Published: 01 Jan 2007

ArcSight, an HP Company

Security Controls Oversight for Sarbanes-Oxley Audit and Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: Download this white paper and learn how ensure your company's compliant with a security management strategy that enables you centrally collect, store, monitor and display security event data.
Posted: 24 Jan 2007 | Published: 01 Dec 2006

ArcSight, an HP Company

Best Practices for Building a Security Operations Center
sponsored by CA Technologies.
WHITE PAPER: In this paper, we explore the business and technical requirements that organizations must consider when implementing a SOC.
Posted: 27 Dec 2006 | Published: 01 Aug 2006

CA Technologies.

Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
sponsored by SecureWave
CASE STUDY: This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
Posted: 20 Nov 2006 | Published: 20 Nov 2006

SecureWave

Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006

Webroot
101 - 125 of 130 Matches Previous Page    3 4 5 6    Next Page
 
SECURITY AUDITS DEFINITION (continued): …  wake of legislation (such as HIPAA, the Sarbanes-Oxley Act, and the California Security Breach Information Act) that specifies how organizations must deal with information. Learn more about audits at SearchCompliance.com. According to Ira Winkler, president of the Internet Security Advisors Group, security audits, vulnerability assessments, and penetration testing are the three main types of security diagnostics. Each of the three takes a different approach and may be best suited for a particular purpose. Security audits measure an information system's performance against a list of criteria. … 
Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement