IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed   
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 

Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Security Audits Reports
101 - 125 of 248 Matches Previous Page  |  Next Page
Ensure the Right Solution for your RSA Data Protection Manager Migration
sponsored by Gemalto
WHITE PAPER: When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Your Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Take a look at five recent networking trends, why they represent real risk to your organization, and ways to implement a new security strategy that will allow you to embrace the opportunities of the digital economy with confidence.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Fortinet, Inc.

Three Steps to Securing Data in Any Cloud Environment
sponsored by Gemalto
WHITE PAPER: In this white paper learn the big benefits, and big risks, of utilizing the cloud for your organization as well as 3 ways to maintain control in the cloud.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

What it Takes for Encryption Key Manager to Combat Today's Threats
sponsored by Gemalto
WHITE PAPER: Learn how to manage your existing keys from third-party solutions, while offering you a full portfolio of flexible encryption options that work on-premises, in traditional data centers, and in virtualized public or private-cloud environments.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Securing Data Across Your Every Environment
sponsored by Gemalto
WHITE PAPER: Learn about cryptographic keys and how they can secure your vital data. Discover the 4V's model, how the level of encryption is applied, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Office 365: How to Deploy Truly Comprehensive Security
sponsored by Proofpoint, Inc.
RESOURCE: Find 10 tips for securing Office 365, including considerations for deploying effective email protection, blocking credential phishing, preventing business email compromise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Proofpoint, Inc.

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: Find out how to set up your enterprise for future Internet of Things success, how to handle common data security problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

The 2016 Global Cloud Data Security Study
sponsored by Gemalto
WHITE PAPER: In this in-depth report conducted by the Ponemon Institute, uncover trends that are arising in cloud governance and security practices, how they can affect your organization, and recommendations on improving cloud governance.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Why Perimeter Defenses Fail in the Face of Modern Threats
sponsored by Gemalto
WHITE PAPER: Discover what security features businesses are focusing on, why perimeter defense is not a cure-all for data breaches, and the consequences for not proofing your organization adequately for the modern threat landscape.
Posted: 13 Mar 2017 | Published: 31 May 2016

Gemalto

Is Onboard Key Storage the Right Corporate Strategy?
sponsored by Gemalto
WHITE PAPER: Learn the answer to the question: "Is onboard key storage a 'good enough' solution, or is an external key management system something that should be deployed?"
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Gemalto

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 01 Sep 2016 | Published: 02 Sep 2016

ComputerWeekly.com

Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 05 Aug 2016 | Published: 05 Aug 2016

ComputerWeekly.com

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

Minimize the Risk and Impact of a Breach in the Cloud
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to reduce the scope and duration of a data breach in the cloud with a multi-pronged approach to security. Discover 5 strategies for success.
Posted: 07 Mar 2017 | Published: 07 Mar 2017

Dell SecureWorks

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

Security Rating Scores for Third-Party Vendors Catching On
sponsored by BitSight
EGUIDE: In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
Posted: 23 Feb 2017 | Published: 15 Feb 2017

BitSight

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM

Go Beyond Just Securing Your Cloud, Make it Better
sponsored by McAfee, Inc.
RESOURCE CENTER: Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

McAfee, Inc.

What's the Best Way to Handle External Security Auditors?
sponsored by Dell Software
EGUIDE: A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration
sponsored by Dell Software
EGUIDE: This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software

Security Audit Planning and Preparation: Engage Early and Often
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore how you can prepare for and participate in a security audit. Find out what you should do in advance to get ready for the auditor's visit and how to address gaps once they've been identified.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software

How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE: Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

Dell Software

Laptop Management for Windows
sponsored by IBM MaaS360
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM MaaS360
101 - 125 of 248 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement