Audit PublicWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Audit Public returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Data Center Management
 •   Network Security
 •   Access Control
 •   Application Management and Maintenance

Related Searches
 •   Audit Basic
 •   Audit Public Standards
 •   Balancing Audit
 •   Directories Audit Public
 •   Download Audit Public
 •   Forms Audit Public
 •   Latest Audit Public
 •   Matrix Audit
 •   Measure Audit Public
 •   Providers Audit
Advertisement

ALL RESULTS
1 - 25 of 452 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly – 16 July 2013: Cloud takes to the stage at the Royal Opera House by ComputerWeekly.com

July 16, 2013 - (Free Research)
In this week's Computer Weekly, we talk to the Royal Opera House about how using public cloud boosted ticket sales and improved performance of its IT infrastructure. We examine why agile development failed in the government's flagship Universal Credit welfare programme. And we analyse the real risks of sweating your IT assets. Read the issue now. 
(EZINE) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector by Dell SecureWorks UK

August 2011 - (Free Research)
Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

VMware TV Series: The Enterprise-Class Hybrid Cloud. Delivered. by VMware, Inc.

April 2011 - (Free Research)
View this webcast to learn how VMware vCloud™ and the VMware service provider ecosystem can help you extend your VMware private cloud environment with compatible public cloud computing services. Discover how VMware delivers enterprise-class public and hybrid cloud infrastructure solutions as an evolution of virtualization. 
(WEBCAST) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

What Auditors Think about Crypto by Thales

May 2011 - (Free Research)
Thales e-Security & The Ponemon Institute present a joint webinar “What Auditors Think about Crypto”. The webinar discusses the findings of a recent survey that was conducted with auditors in various industries. 
(WEBCAST) READ ABSTRACT |

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information by Iron Mountain

December 2013 - (Free Research)
Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices. 
(WHITE PAPER) READ ABSTRACT |

5 Backup Features to Ensure Compliance by APTARE

June 2013 - (Free Research)
In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information. 
(WHITE PAPER) READ ABSTRACT |

The Role of Security Management in Achieving "Continuous Compliance" by CA Technologies.

December 2007 - (Free Research)
There's a focus today on regulatory compliance involving financial reporting, security and data privacy. But there are also tremendous business performance opportunities that can be fueled by the new requirements. This paper details the benefits of continuous compliance, which include reduction of risk and cost. 
(WHITE PAPER) READ ABSTRACT |

10 Security Concerns for Cloud Computing by Global Knowledge

March 2010 - (Free Research)
Read this paper to learn the many benefits of cloud computing as well as the 10 security concerns that need to be addressed when considering moving critical applications and sensitive data to public and shared cloud environments. 
(WHITE PAPER) READ ABSTRACT |

Mitigate the Risks of File Sharing and BYOD with Private Clouds by Accellion, Inc.

June 2013 - (Free Research)
This informative white paper examines private cloud solutions for file sharing and synchronization, discussing how a private cloud can help you realize the benefits that BYOD provides without having to expose your sensitive information to potential risks. 
(WHITE PAPER) READ ABSTRACT |

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies by Embarcadero Technologies, Inc.

March 2009 - (Free Research)
Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies. 
(WHITE PAPER) READ ABSTRACT |

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 2009 - (Free Research)
SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements. 
(WEBCAST) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks by Accellion, Inc.

June 2013 - (Free Research)
Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more. 
(WHITE PAPER) READ ABSTRACT |

Red Hat Enterprise Linux OpenStack Platform - A Cost-effective Private Cloud for your Business by Red Hat

May 2014 - (Free Research)
This whitepaper will help you learn more about private cloud solutions and examines the Red Hat Enterprise Linux OpenStack Platform as a cost-effective, open-source cloud solution for your business. 
(WHITE PAPER) READ ABSTRACT |

The Impact of Carrier Ethernet on Service Providers by Dorado Software

September 2009 - (Free Research)
Mobile internet access and the explosive demand for high bandwidth services on mobile devices have created a pivotal point for service providers. Those providers that can meet the new demands while increasing efficiency will be able to increase their market share, while those that are not will lose ground. Read on to learn how to keep up. 
(WHITE PAPER) READ ABSTRACT |

Basic Building Blocks: Preparing for PCI DSS 2.0 by Veracode, Inc.

October 2010 - (Free Research)
With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards. 
(WEBCAST) READ ABSTRACT |

Taking Enterprise Application Integration into the Cloud by Dell, Inc.

June 2012 - (Free Research)
Of all the advancements to enterprise computing, the cloud is the latest, coming with an assortment of promises to totally reshape your organization's computing approach. Access this brief and exclusive resource for an overview of cloud computing, specifically software-as-a-service. 
(WHITE PAPER)

Taking Enterprise Application Integration Into The Cloud by Dell, Inc.

August 2011 - (Free Research)
Of all the advancements to enterprise computing, the cloud is the latest, coming with an assortment of promises to totally reshape your organization's computing approach. Access this brief and exclusive resource for an overview of cloud computing, specifically software-as-a-service. 
(WHITE PAPER) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing by nCircle

March 2009 - (Free Research)
Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations. 
(WHITE PAPER) READ ABSTRACT |

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 452 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts