IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 
Definition continues below.
Security Audits Reports
76 - 100 of 343 Matches Previous Page  |  Next Page
ITAD to Strengthen Data Protection
sponsored by Iron Mountain
WHITE PAPER: IT Asset Disposition is quickly becoming a one stop shop for mitigating end-of-lifecycle risks and data protection compliance. Learn the importance of ITAD in protecting data and meeting compliance requirements.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Iron Mountain

Gov't Agencies: Remain Secure and Compliant with 5 Considerations
sponsored by TechData - Brother
WHITE PAPER: Discover 5 considerations when looking to remain secure and compliant in today's threat environment.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

TechData - Brother

THE C-SUITE, THE BOARD AND CYBER-DEFENCE
sponsored by Oracle Corporation
RESEARCH CONTENT: Analyze this report filled with research from the Economist showing the 8 steps the C-Suite can take to succeed in reducing breaches across all major forms of cyberattack.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Oracle Corporation

DevSecOps: How to Seamlessly Integrate Security Into DevOps
sponsored by Sonatype
WHITE PAPER: In this Gartner report discover strong recommendations for IT security professionals to preserve the teamwork, agility and speed of DevOps and agile development environments, all while ensuring security.
Posted: 25 Apr 2017 | Published: 30 Sep 2016

Sonatype

Perimeter Security: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Discover how to rethink, re-invent, and re-architect your IAM strategies. Access this white paper to learn how to ensure secure authentication for all apps and address the inherent risks associated with decentralized access controls and identity sprawl.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

F5 Networks

BitLocker Toolkit
sponsored by WinMagic
WHITE PAPER: Access this white paper to discover how your enterprise can optimize its use of BitLocker to improve its encryption and identity security.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

WinMagic

Identity Management: The Key to Stopping Breaches
sponsored by SailPoint Technologies
WHITE PAPER: With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SailPoint Technologies

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

Achieving Optimal IFRS 9 Compliance
sponsored by SAS
WHITE PAPER: Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SAS

How to Secure Your Digital Experience
sponsored by Oracle Corporation
WEBCAST: Managing identity and access and understanding an individual in context is crucial to obtaining trust in today's constant drive towards adding value and driving innovation in today's IT landscape. Learn how to gain trust, and avoid losing it overnight, in today's threat landscape
Posted: 24 Apr 2017 | Premiered: Apr 19, 2017

Oracle Corporation

IAM: Your Tool to Defeating Data Breaches
sponsored by SailPoint Technologies
WHITE PAPER: A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies

Security Report: Transaction Monitoring Optimization
sponsored by SAS
WHITE PAPER: Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind.
Posted: 21 Apr 2017 | Published: 31 Dec 2016

SAS

SAS Solution for Personal Data ProtectionEnabling compliance with new regulation
sponsored by SAS
WHITE PAPER: Failing to comply with the GDPR can result in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SAS

SailPoint-Get-Ready-for-GDPR
sponsored by SailPoint Technologies
WHITE PAPER: Learn how to utilize both identity and data access governance to gain full visibility to help you comply with the upcoming GDPR deadline.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies

Secure and Govern Workloads and Infrastructure with Policy
sponsored by Apcera
WEBCAST: Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.
Posted: 21 Apr 2017 | Premiered: May 26, 2016


The Role of Policy in Governing and Securing the Cloud
sponsored by Apcera
WHITE PAPER: Learn how to enable your security policy to help mitigate human errors and avoid costly data breaches. Additionally uncover 4 key areas where you need a security policy, a 3-part methodology to modern policy, and more.
Posted: 21 Apr 2017 | Published: 29 Feb 2016


Do You Know Who Owns Your Data?
sponsored by SailPoint Technologies
WHITE PAPER: Access this white paper to learn how to reduce the risk of your unstructured data being used negligently or maliciously, elect the right "data owners" to ensure the security of your data, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

SailPoint Technologies

Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Hewlett Packard Enterprise

The Ultimate Guide to the CCSP
sponsored by ISC2
WHITE PAPER: Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

ISC2

Employee Monitoring: An Important Security Measure?
sponsored by Veriato, Inc.
EGUIDE: Learn how to mitigate the threat posed by threats from within your own enterprise, and what court rulings could affect this.
Posted: 19 Apr 2017 | Published: 12 Apr 2017

Veriato, Inc.

Is the Future of Enterprise Security In Managed Services?
sponsored by F5 Networks
WHITE PAPER: Security is becoming an increasingly complex and costly challenge for many organizations to manage on premises. Access this white paper now to learn the potential benefits of outsourcing cybersecurity and more.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

F5 Networks

77% of Hacked Passwords Comply with Current Standards
sponsored by Specops Software
RESOURCE: Discover a method of granulated password policy application that provides protection and support not available under the default Window's password policy. Also uncover a link to a password strength auditor and more.
Posted: 19 Apr 2017 | Published: 10 Feb 2017

Specops Software

Log Management and Analytics: Your Guide
sponsored by Logentries
WEBCAST: Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.
Posted: 19 Apr 2017 | Premiered: Apr 13, 2017

Logentries

Hackers Share Secrets so You Can Make Their Job Harder
sponsored by Thycotic
WHITE PAPER: Discover 5 secrets hackers shared at the 2016 Black Hat conference that you can use to make their jobs more difficult and secure your passwords and privileged accounts.
Posted: 19 Apr 2017 | Published: 31 Dec 2016

Thycotic

What New NIST Password Recommendations Should Enterprises Adopt?
sponsored by Specops Software
EGUIDE: Learn what makes a password effective for your enterprise, password best practices, and what can be learned from the NIST guidelines.
Posted: 18 Apr 2017 | Published: 11 Apr 2017

Specops Software
76 - 100 of 343 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY AUDITS DEFINITION (continued): …  wake of legislation (such as HIPAA, the Sarbanes-Oxley Act, and the California Security Breach Information Act) that specifies how organizations must deal with information. Learn more about audits at SearchCompliance.com. According to Ira Winkler, president of the Internet Security Advisors Group, security audits, vulnerability assessments, and penetration testing are the three main types of security diagnostics. Each of the three takes a different approach and may be best suited for a particular purpose. Security audits measure an information system's performance against a list of criteria. … 
Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement