IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 
Definition continues below.
Security Audits Reports
51 - 75 of 369 Matches Previous Page  |  Next Page
Key Technologies and Best Practices for GDPR Success
sponsored by Commvault
WHITE PAPER: Discover a comprehensive summary of the GDPR and what your company must prepare for when it comes to compliance.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Commvault

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover how to secure today's servers by examining the dynamics of the hybrid cloud and the challenges introduced at both the business and technical levels.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

TrendMicro

The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

A Security Leader's Definitive Guide To The Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 major threats to your organization, how to deploy an integrated security fabric connecting endpoints with networks across the cloud, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

Surveying the DNS Threat Landscape
sponsored by Infoblox
EGUIDE: Learn how to mitigate the risk and vulnerability DNS presents to your organization.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Infoblox

The Current State of Ransomware
sponsored by Dell SecureWorks
WHITE PAPER: Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Dell SecureWorks

Key Considerations for Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn 4 key considerations for securing privilege on the endpoint, how privilege is abused by malicious actors to cause breaches, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

CyberArk Software, Inc

Top 5 Reasons to Prioritize Privileged Account Security Today
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn 5 reasons to prioritize privileged account security in today's threat landscape.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

CyberArk Software, Inc

Preparing For The General Data Protection Regulation (GDPR)
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover your guide to complying with the GPDR and the role of automated network security in preventing intrusion and minimizing the risk of a serious breach.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

DNS Moves to the Core of IT Security
sponsored by Infoblox
WHITE PAPER: Learn how to approach the serious threat of DDoS attacks comprehensively and protect your DNS.
Posted: 31 May 2017 | Published: 31 May 2017

Infoblox

Create an Early Warning System for Evolving Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to deploy an early warning system for evolving cyber threats, enabling your organization to prevent, detect, predict, and rapidly respond to cyberattacks.
Posted: 31 May 2017 | Published: 31 May 2017

Dell SecureWorks

The Danger Within: Unmasking Insider Threats
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover the who, what, why and how of the insider threat to expose risks you may not be considering. Also uncover guidance to help you prevent and detect these costly attacks.
Posted: 31 May 2017 | Published: 31 May 2017

CyberArk Software, Inc

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 reasons cybersecurity remains a major issue for enterprises today and how to mitigate their risk as well as improve your organization's risk threshold.
Posted: 31 May 2017 | Published: 31 May 2017

Fortinet, Inc.

Protection and Productivity: Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Explore the challenges surrounding the proper handling of privileged accounts to mitigate risk.
Posted: 31 May 2017 | Published: 31 May 2017

CyberArk Software, Inc

Global Advanced Threat Landscape Survey
sponsored by CyberArk Software, Inc
RESEARCH CONTENT: Despite the efforts to protect against a cybersecurity breach, there is still a gap between "awareness" and "preparedness." Discover the results of over 750 IT and IT security decision makers weighing in on the current state of the security threat landscape.
Posted: 30 May 2017 | Published: 31 Dec 2016

CyberArk Software, Inc

Evaluating Privileged Account Security: 7 Considerations
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn how to avoid giving malicious actors the "all-access pass" they want when trying to crack a privileged user account through 7 questions to ask your privileged account security provider.
Posted: 30 May 2017 | Published: 30 May 2017

CyberArk Software, Inc

Harness Context-aware Security to Combat Threats
sponsored by Infoblox
WHITE PAPER: Learn how to secure the core of your network and defend against the biggest threats to your enterprise from the inside.
Posted: 30 May 2017 | Published: 30 May 2017

Infoblox

How to Quickly Reduce the Risk of a Breach
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover a 30-day framework, based off of lessons learned from actual data breaches, to implement a set of key controls around privileged credentials that can reduce your risk profile.
Posted: 30 May 2017 | Published: 30 May 2017

CyberArk Software, Inc

Ensure Success for Your IAM Project
sponsored by One Identity
WHITE PAPER: Discover how to achieve success with your IAM project. Learn about the 3 pillars of IAM functionality, 3 major reasons why IAM projects fail, how your peers struggle with IAM, and more.
Posted: 30 May 2017 | Published: 30 May 2017

One Identity

Use Case: Securing Data Centers
sponsored by Bayshore Networks
WHITE PAPER: In this use case, learn how to secure your vulnerable data centers. Also learn about proactive prediction of Industrial Controls failures, ROI associated with capital and maintenance costs, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Mobile and Cloud Security: MobileIron vs Microsoft Intune
sponsored by MobileIron
WHITE PAPER: This resource highlights the key differences between MobileIron and Microsoft's Intune. Discover how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.
Posted: 26 May 2017 | Published: 26 May 2017

MobileIron

Implementing Effective Incident Response
sponsored by Rsam
WHITE PAPER: Uncover how to more efficiently and more effectively respond to incidents with an incident response platform.
Posted: 26 May 2017 | Published: 26 May 2017

Rsam

Five DLP Tips from Security Executives
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn 5 tips to improve your organization's DLP, how to use DLP to protect regulated data and reduce business risk, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks
51 - 75 of 369 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY AUDITS DEFINITION (continued): …  wake of legislation (such as HIPAA, the Sarbanes-Oxley Act, and the California Security Breach Information Act) that specifies how organizations must deal with information. Learn more about audits at SearchCompliance.com. According to Ira Winkler, president of the Internet Security Advisors Group, security audits, vulnerability assessments, and penetration testing are the three main types of security diagnostics. Each of the three takes a different approach and may be best suited for a particular purpose. Security audits measure an information system's performance against a list of criteria. … 
Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement