A AuditWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: A Audit returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Management
 •   Automated Security Auditing/ Source Code Analysis
 •   Security Policies
 •   Backup Systems and Services
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Storage Security
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   A Audit Full
 •   A Devices
 •   A Operating
 •   A Software
 •   Introduction Of A Audit
 •   Measurement A Audit
 •   Networks A Audit
 •   Notes A Audit
 •   Project A
 •   Technical A Audit
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

When It's Time for an Audit, Will You Be Ready? by Iron Mountain

March 01, 2012 - (Free Research)
Check out this white paper for best practices on how to best prep yourself for the audit process - learn how to create a backup and recovery plan that includes the right audit and accountability features, discover four keys to help you on the path to compliance and more. 
(WHITE PAPER) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 03, 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options by IBM

May 20, 2011 - (Free Research)
Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization. 
(EGUIDE) READ ABSTRACT |

The Intersection of SAM and Security by CDW Corporation

March 24, 2014 - (Free Research)
This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex. 
(WHITE PAPER) READ ABSTRACT |

Active Directory Auditing: What It Is, and What It Isn’t by Dell Software

February 25, 2013 - (Free Research)
This white paper discusses the problems that stem from Active Directory (AD) native audit loggings, the functionalities you really need from your AD auditing solution for efficient management. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 06, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 03, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Webroot Enterprise Spy Audit by Webroot

October 16, 2006 - (Free Research)
Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders. 
(TRIAL SOFTWARE) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 25, 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

Are You Prepared for a Software Audit? by CDW Corporation

February 27, 2014 - (Free Research)
Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 19, 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

Preparation by Automation: Reducing the Cost, Pain, Time, and Risk of IT Security Audits by TraceSecurity

March 2008 - (Free Research)
This white paper explains how IT organizations can use automation to better prepare themselves for IT security audits, thereby significantly reducing the cost, pain, time, and risk associated with them. 
(WHITE PAPER) READ ABSTRACT |

Leading Pharmaceutical Company Reduces Costs to Meet CFR Compliance Through Digital Signature Implementation by Hexaware Technologies

October 2011 - (Free Research)
In this brief case study, discover eSignature's method of capturing electronic signatures at appropriate points in the work flows, storing relevant information, and enabling an audit trail to be retrieved for each applicable asset. 
(CASE STUDY) READ ABSTRACT |

Simplifying Log Collection, Storage and Analysis by ArcSight, an HP Company

September 2009 - (Free Research)
ArcSight Logger is a turnkey appliance for collection, efficient storage, and high-performance search and reporting of all enterprise log data. Read this paper to learn more details. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Configuration Assessment: Choosing the Right Solution by Tripwire, Inc.

July 2008 - (Free Research)
Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits. 
(WHITE PAPER) READ ABSTRACT |

Survive the Scrutiny of Litigation:Rediscover Records Management by Iron Mountain

August 2012 - (Free Research)
Having a modern records management system can give you the peace of mind you need and save you enormous headaches and revenue losses in the event of an audit. This comprehensive E-Guide explores today's best practices for records management. 
(EBOOK) READ ABSTRACT |

Fast Track to Archived Data Access by Iron Mountain

March 2012 - (Free Research)
Read this paper for best practices and keys to help you prepare for a compliance or audit request. Learn how an offsite partner can help improve your data protection, accessibility and recoverability, and receive 7 keys to help improve your security and backup policies. Also receive checklist of 4 keys to help you better access your information. 
(WHITE PAPER) READ ABSTRACT |

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.

July 2008 - (Free Research)
In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. 
(WHITE PAPER) READ ABSTRACT |

2010 Information Security & Compliance Trend Study by nCircle

August 2010 - (Free Research)
This report summarizes the results of the nCircle 2010 Information Security and Compliance Trend Study, a cross-industry survey of over 250 respondents in the IT security industry in the United States and Canada. Over 65% of survey respondents are from large and midsize enterprises. 
(WHITE PAPER) READ ABSTRACT |

ArcSight Logger: Universal Log Management Solution by ArcSight, an HP Company

March 2011 - (Free Research)
ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Five Challenges to Continuous PCI DSS Compliance by Tripwire, Inc.

February 2011 - (Free Research)
As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. 
(WHITE PAPER) READ ABSTRACT |

Five Challenges to Continuous PCI DSS Compliance by Tripwire, Inc.

April 2010 - (Free Research)
As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them. 
(WHITE PAPER) READ ABSTRACT |

IBM Tivoli Security User Compliance Management Demo by IBM

December 2008 - (Free Research)
This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information. 
(DEMO)

Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management by Novell, Inc.

October 2009 - (Free Research)
Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats. 
(WHITE PAPER) READ ABSTRACT |

4 issues caused by retaining too much unnecessary data by DLT Solutions

June 2012 - (Free Research)
Access this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts