Audit DevicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Audit Devices returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Security Monitoring
 •   Data Security
 •   Security Policies
 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis
 •   Vulnerability Assessment
 •   Endpoint Security

Related Searches
 •   Audit Devices Example
 •   Audit Devices Indiana
 •   Audit Devices Knowledge
 •   Audit Devices Sales
 •   Audit India
 •   Capacities Audit
 •   Format Audit Devices
 •   Provider Audit Devices
 •   Spreadsheets Audit
 •   Unix Audit
Advertisement

ALL RESULTS
1 - 25 of 448 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 14, 2013 - (Free Research)
In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 07, 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Heinz Uses Wireless Technology to Gain Retail Advantage by BlackBerry

February 2009 - (Free Research)
Heinz wanted to speed up and improve the quality of scorecard information they gathered about Heinz brands in retail stores; so they used the Electronic Retail Audit solution on BlackBerry devices to provide brokers with accurate feedback. 
(CASE STUDY) READ ABSTRACT |

Simplifying Log Collection, Storage and Analysis by ArcSight, an HP Company

September 2009 - (Free Research)
ArcSight Logger is a turnkey appliance for collection, efficient storage, and high-performance search and reporting of all enterprise log data. Read this paper to learn more details. 
(PRODUCT OVERVIEW) READ ABSTRACT |

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability by Tripwire, Inc.

July 2008 - (Free Research)
Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Network Security Monitoring by SearchMidMarketSecurity

May 2010 - (Free Research)
SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit. 
(EBOOK) READ ABSTRACT |

E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.com

April 2009 - (Free Research)
Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well. 
(EBOOK) READ ABSTRACT |

Centralized Management Key to Controlling Mobile Communications Cost by Digital Fairway, Inc.

November 2007 - (Free Research)
In this paper, learn why centralized policy management, automated order processing and asset management, and end-user self-service are key ingredients for any organization trying to control the proliferation of wireless mobile devices and spiraling costs. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Network Security Monitoring by AVG Technologies USA, Inc.

November 2010 - (Free Research)
Your organization’s network is more than a collection of pipes through which traffic flows: it’s your business’ fundamental IT architecture. Your security devices keep a watchful eye on traffic and systems, and maintain the integrity of your data and systems. Check out this guide to network security monitoring from SearchMidmarketSecurity.com. 
(EBOOK)

Lumension Sanctuary Device & Application Control for Endpoint Security -- 30-day Free Trial by Lumension

January 2008 - (Free Research)
Protecting networks from malware can seem like an insurmountable challenge. In this 30-day free trial download, see how Lumension's Sanctuary Device and Application Control enable only authorized applications to run and only authorized devices to connect to a laptop or desktop, removing the risk of data leakage and malware. 
(DEMO)

Lumension Sanctuary Device Control by Lumension

February 2009 - (Free Research)
Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints. 
(TRIAL SOFTWARE)

Optiview Network Analyzer -- Free Hardware Trial by Fluke Networks

February 2009 - (Free Research)
IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection. 
(PRODUCT DEMO)

Managing mobile UC in a BYOD environment by SearchSecurity.com

July 2012 - (Free Research)
This e-guide reviews key tips and considerations to keep in mind when designing mobile UC and Bring Your Own Device (BYOD) policies to keep sensitive information secure while enabling increased flexibility and mobility. 
(EGUIDE) READ ABSTRACT |

Cirrus Configuration Manager by SolarWinds, Inc.

January 2008 - (Free Research)
Cirrus Configuration Manager. 
(TRIAL SOFTWARE) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

No Blind Spots in Perimeter Security with Security Event Information Management by Radware

October 2011 - (Free Research)
Security Event Information Management (SEIM) can provide the security leap-frog in a world of point solutions – to ensure there are no blind spots in your network security architecture. 
(WHITE PAPER) READ ABSTRACT |

File Security: Audit and Protect Critical Files by Imperva

August 2010 - (Free Research)
Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices. 
(WHITE PAPER) READ ABSTRACT |

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks by Accellion, Inc.

June 2013 - (Free Research)
Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more. 
(WHITE PAPER) READ ABSTRACT |

Mitigate the Risks of File Sharing and BYOD with Private Clouds by Accellion, Inc.

June 2013 - (Free Research)
This informative white paper examines private cloud solutions for file sharing and synchronization, discussing how a private cloud can help you realize the benefits that BYOD provides without having to expose your sensitive information to potential risks. 
(WHITE PAPER) READ ABSTRACT |

Securing the Mobile Cloud Connected Enterprise by CA Technologies.

June 2014 - (Free Research)
This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Mobile Data Protection by SearchSecurity.com

June 2011 - (Free Research)
This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace the trend toward using personal devices for business. 
(EGUIDE) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

Trends in Enterprise Mobility by ComputerWeekly.com

April 2013 - (Free Research)
This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working. 
(WHITE PAPER) READ ABSTRACT |

Empower your Developers by Coverity

May 2011 - (Free Research)
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 448 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts