IT Management  >   Systems Operations  >   Security  >  

Audits

RSS Feed   
Audits Reports
 
Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: Find out how to set up your enterprise for future Internet of Things success, how to handle common data security problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Three Steps to Securing Data in Any Cloud Environment
sponsored by Gemalto
WHITE PAPER: In this white paper learn the big benefits, and big risks, of utilizing the cloud for your organization as well as 3 ways to maintain control in the cloud.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Nexen Energy Accelerates and Strengthens its External Audit Processes with ServiceNow GRC
sponsored by ServiceNow
CASE STUDY: Find out how this energy company was able to automate the end-to-end audit process with a sustainable, agile, and transparent approach to GRC.
Posted: 03 Oct 2018 | Published: 03 Oct 2018

ServiceNow

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

How To Limit Privileged Accounts And Boost Security
sponsored by Devolutions
EGUIDE: Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
Posted: 20 Mar 2017 | Published: 15 Mar 2017

Devolutions

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk Software, Inc
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk Software, Inc

Q&A: Analyzing DNS Services with Paul Vixie
sponsored by Farsight Security
EGUIDE: Dive into this interview as cybersecurity expert Paul Vixie, one of the founders of the Internet Software Consortium, talks about some of his ongoing domain name system (DNS) research, including how domain names are being abused and the data science of looking for patterns.
Posted: 10 Apr 2017 | Published: 04 Apr 2017

Farsight Security

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The Current State of Ransomware
sponsored by Dell SecureWorks
WHITE PAPER: Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement