IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 
Definition continues below.
Security Audits Reports
26 - 50 of 319 Matches Previous Page  |  Next Page
GDPR Compliance: From a Compliance Burden to a Security Opportunity
sponsored by Symantec
WHITE PAPER: Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Symantec

Biggest Security Threats to Your AWS Environment
sponsored by Cryptzone
WHITE PAPER: Learn how to remove operational complexity from achieving secure, and easily auditable, user access to your AWS systems.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Cryptzone

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

Hybrid Clouds: Best Practices for Harnessing and Securing
sponsored by TrendMicro
WHITE PAPER: Gain insight into understanding the business, organizational, and technical dimensions of securing hybrid clouds.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden of GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

How Hybrid Cloud Has Transformed Security of the Data Center
sponsored by TrendMicro
WHITE PAPER: Learn how server security has evolved in the face of cloud computing, and what it takes to secure your company's servers today.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Stopping Crypto Ransomware
sponsored by Datto, Inc.
WHITE PAPER: Discover a 16-point guide to combating crypto ransomware in today's threat landscape.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Datto, Inc.

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
WHITE PAPER: According to the National Small Business Association, 44% of small businesses have been the victim of a cyberattack and the number of breaches reported per year continues to climb. Learn how to develop a robust, multi-layered cybersecurity strategy for SMBs.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Datto, Inc.

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover how to secure today's servers by examining the dynamics of the hybrid cloud and the challenges introduced at both the business and technical levels.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

TrendMicro

Key Considerations for Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn 4 key considerations for securing privilege on the endpoint, how privilege is abused by malicious actors to cause breaches, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

CyberArk Software, Inc

Top 5 Reasons to Prioritize Privileged Account Security Today
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn 5 reasons to prioritize privileged account security in today's threat landscape.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

CyberArk Software, Inc

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 reasons cybersecurity remains a major issue for enterprises today and how to mitigate their risk as well as improve your organization's risk threshold.
Posted: 31 May 2017 | Published: 31 May 2017

Fortinet, Inc.

Protection and Productivity: Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Explore the challenges surrounding the proper handling of privileged accounts to mitigate risk.
Posted: 31 May 2017 | Published: 31 May 2017

CyberArk Software, Inc

Evaluating Privileged Account Security: 7 Considerations
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn how to avoid giving malicious actors the "all-access pass" they want when trying to crack a privileged user account through 7 questions to ask your privileged account security provider.
Posted: 30 May 2017 | Published: 30 May 2017

CyberArk Software, Inc

Cloud Computing Top Threats
sponsored by HPE and IntelĀ® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and IntelĀ® Corporate

How to Prepare for a Cloud DDoS Attack on an Enterprise
sponsored by F5 Networks
EGUIDE: Learn the truth behind cloud DDoS attacks and how an enterprise that uses cloud services could protect itself against such a threat.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

A Closer Look at Cloud Migration Security Risks
sponsored by F5 Networks
EGUIDE: Explore the security challenges when moving workloads and data into the cloud, and how to mitigate the risks they entail.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk Software, Inc
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk Software, Inc

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

The Current State of Ransomware
sponsored by Dell SecureWorks
WHITE PAPER: Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Dell SecureWorks

Preparing For The General Data Protection Regulation (GDPR)
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover your guide to complying with the GPDR and the role of automated network security in preventing intrusion and minimizing the risk of a serious breach.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Create an Early Warning System for Evolving Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to deploy an early warning system for evolving cyber threats, enabling your organization to prevent, detect, predict, and rapidly respond to cyberattacks.
Posted: 31 May 2017 | Published: 31 May 2017

Dell SecureWorks
26 - 50 of 319 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY AUDITS DEFINITION (continued): …  wake of legislation (such as HIPAA, the Sarbanes-Oxley Act, and the California Security Breach Information Act) that specifies how organizations must deal with information. Learn more about audits at SearchCompliance.com. According to Ira Winkler, president of the Internet Security Advisors Group, security audits, vulnerability assessments, and penetration testing are the three main types of security diagnostics. Each of the three takes a different approach and may be best suited for a particular purpose. Security audits measure an information system's performance against a list of criteria. … 
Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement