IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed   
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 

Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Security Audits Reports
1 - 25 of 142 Matches Previous Page  |  Next Page
New Topics on the New Security+ SY0-501 Exam
sponsored by Global Knowledge
WHITE PAPER: In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Global Knowledge

Under the Hoodie 2019
sponsored by Rapid7
RESOURCE: Due to the sensitive nature of its findings, penetration testing is a relatively unknown, yet critical, piece of the information security puzzle. This study by Rapid7 was an effort to demystify what goes on in a typical pen test by examining 180 engagements to break down what clients and practitioners should expect to see.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Rapid7

How to be a SOAR Winner
sponsored by IBM
RESOURCE: As cyberattacks and malware threats grow increasing sophisticated, implementing an automated and orchestrated security environment is critical for detecting and defecting cyberthreats. Read on to learn about the eight most critical success factors in creating and sustaining an intelligently automated, orchestrated security team.
Posted: 20 Dec 2019 | Published: 20 Dec 2019

IBM

Multi-pronged approach to cyber security professional development
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

Your Cybersecurity Tech Stack Creating More Gaps
sponsored by Optiv
RESOURCE: It’s a common misconception that more tech services mean more security, but the reality is quite the opposite. In fact, a Cisco cybersecurity report reveals a correlation between the number of security vendors and the number of breaches. In this infographic, dive deeper into this issue and explore ways to close the gap.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Optiv

Easy Ways to Dominate the Securities-as-a-Service Game
sponsored by RapidFire
WHITE PAPER: Download this paper to discover how establishing Securities-as-a-Service offerings in your MSP will not only remediate your customers’ internal vulnerabilities but will also result in additional revenue for you.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

The Financial Adviser's Guide to Compliant IM and Collaboration
sponsored by Smarsh
WHITE PAPER: The rise of collaboration platforms and the compliance requirements they bring with them are a symptom of a larger reality: Workplace communications are changing. Read on to learn how you add IM and collaboration platforms to a compliant ecosystem in your organization.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

The Financial Adviser's Guide to Social Media Strategy and Policy
sponsored by Smarsh
WHITE PAPER: The U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA) recognize social media’s growing role in firms’ marketing strategies. In this guide, find practical steps to help you develop social media strategy and policy that meets social media recordkeeping and supervision regulatory requirements.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

Blueprint for PCI Compliance with Network Detective
sponsored by RapidFire
WHITE PAPER: The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.
Posted: 02 Dec 2019 | Published: 31 Dec 2017

RapidFire

Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Tech-Savvy English Public School Streamlines Office 365 Security
sponsored by Barracuda
CASE STUDY: Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Barracuda

Cloud Security Guardian Integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.
Posted: 08 Oct 2019 | Premiered: 31 Jul 2019

Barracuda

Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Oct 2019 | Premiered: 31 May 2019

Barracuda

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

ComputerWeekly.com

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Transparent Data Movement Solution Overview
sponsored by RackTop Systems
DATA SHEET: Download this paper for a sneak-peek at a Transparent Data Movement (TDM) tool that intelligently and seamlessly moves data between performance tiers and more economical tiers of storage, without disruption, to lower TCO—all under the constant protection of policy-based security and compliance.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

CyberConverged Data Storage
sponsored by RackTop Systems
DATA SHEET: Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage Designed for the Creative Process
sponsored by RackTop Systems
DATA SHEET: Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

CyberConverged Storage: An Overview
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Getting a Handle on Data Exposure
sponsored by RackTop Systems
DATA SHEET: The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Special Report: 2019 Email Security Trends
sponsored by Barracuda
ANALYST REPORT: How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Barracuda

10 Opportunities for MSPs and MSSPs to Deliver MDR Services
sponsored by AT&T Cybersecurity
RESOURCE: For service providers, the Managed Detection and Response (MDR) trend creates an opportunity to stay competitive and add value that helps clients defend and respond to cyber threats. Read about 10 opportunities to embrace and deliver competitive MDR services.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

AT&T Cybersecurity

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT
1 - 25 of 142 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info