IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 

Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Security Audits Reports
51 - 75 of 242 Matches Previous Page  |  Next Page
Advanced Threat Prevention: 6 Vendors go Head to Head
sponsored by Cylance
RESEARCH CONTENT: See the results of an advanced threat prevention test of enterprise endpoint protection software where 6 competitor endpoint products – Cylance, Kaspersky, McAfee, Sophos, Symantec and Trend Micro – go head-to-head in 4 performance areas.
Posted: 05 May 2017 | Published: 02 Feb 2017

Cylance

Identifying the Timeline Activities of a Cyber Breach
sponsored by Farsight Security
CASE STUDY: In this case study discover how the use of DNSDB in mapping malicious and benign infrastructure revealed the timeline and activity of a breach of the Anthem Healthcare System.
Posted: 05 May 2017 | Published: 05 May 2017

Farsight Security

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

ESG Labs Weigh-in on Advanced Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: This ESG Lab Validation examines the need to addresses advanced email-based threats with Advanced Email Security. ESG Lab evaluated how Proofpoint's unified, multilayered solution offers clear visibility into all of an organization's email and any threats it may contain, along with the ability to respond to and stop those threats.
Posted: 01 May 2017 | Published: 31 Jan 2017

Proofpoint, Inc.

How Credential Phishing is Changing — How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to stop phishing attacks and how the strategy and tactics are getting more sophisticated in surprising ways.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

Compliance Survey: Your Guide to What Experts are Saying
sponsored by Chef Software
WHITE PAPER: Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Chef Software

6 Ways to Improve Your Cybersecurity Posture
sponsored by BDNA
WHITE PAPER: Discover 6 ways to improve your cybersecurity posture, ensuring your organization is taking up a proactive instead of a reactive approach and avoiding the pitfalls of EOL software and the CVEs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

BDNA

What Security Monster is Lurking in Your IT Closet?
sponsored by BDNA
WHITE PAPER: Learn how to build continuous awareness, monitoring, and mitigation of IT vulnerabilities with security automation.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

BDNA

Q&A: Analyzing DNS Services with Paul Vixie
sponsored by Farsight Security
EGUIDE: Dive into this interview as cybersecurity expert Paul Vixie, one of the founders of the Internet Software Consortium, talks about some of his ongoing domain name system (DNS) research, including how domain names are being abused and the data science of looking for patterns.
Posted: 10 Apr 2017 | Published: 04 Apr 2017

Farsight Security

How to Bridge the Gap in Data Protection and Recovery
sponsored by Veeam Software
WHITE PAPER: In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Veeam Software

How to Gain Passive DNS for Enhanced Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Access this white paper to discover how improving your DNS data collection can enhance your threat intelligence, give you faster, more accurate detection/mitigation abilities vs cyberattacks, and more.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

Farsight Security

Is your IT Security Affecting your Workforce Productivity?
sponsored by Dell India
RESEARCH CONTENT: In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

Dell India

Stopping Cyberattacks before they occur: Farsight Security DNS Threat Intelligence - The Red Canary Case Study
sponsored by Farsight Security
CASE STUDY: In this case study learn how Red Canary, a cybersecurity firm, improved Its passive DNS threat intelligence, confirmed and enriched investigative findings, installed a primary and secondary, high fidelity threat indicator, and more.
Posted: 04 Apr 2017 | Published: 31 Dec 2016

Farsight Security

Your Guide to Kingslayer: The Anatomy of a Supply Chain Attack
sponsored by RSA
RESEARCH CONTENT: This postmortem report can help your organization prevent the next loss of business or mission critical information from a sophisticated exploitation campaign, diving in-depth into the Kingslayer attack.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

RSA

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

Beat Ransomware in 5 Easy Steps
sponsored by Unitrends
WHITE PAPER: With the FBI stating that: "The ransomware is that good. To be honest, we often advise people just to pay the ransom," the threat is obvious. Access this white paper now to learn how to beat ransomware in 5 easy steps.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Unitrends

Top 6 Best Practices For Workload Security In Public & Private Cloud
sponsored by Cloudvisory
WHITE PAPER: Learn 6 best practices that your organization can utilize to improve workload security on the cloud.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

Cloudvisory

Cloud Security: An Example Threat Report
sponsored by Cloudvisory
WHITE PAPER: Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

Cloud Security Report: How is IT Responding to Today's Threats
sponsored by Cloudvisory
WHITE PAPER: Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Cloudvisory

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo
51 - 75 of 242 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement