Audit TechnologyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Audit Technology returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Security Monitoring
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Change and Configuration Management
 •   Databases
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions

Related Searches
 •   Audit Experts
 •   Audit Technology Cost
 •   Audit Technology Monitor
 •   Audit Technology Networking
 •   Audit Technology Order
 •   Audit Technology Training
 •   Backups Audit Technology
 •   Planning Audit Technology
 •   Terms Audit Technology
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 25, 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 07, 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech

July 2008 - (Free Research)
This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform. 
(WHITE PAPER) READ ABSTRACT |

Database Auditing Tools and Strategies by Hexis Cyber Solutions Inc

November 2008 - (Free Research)
This paper is to introduce the current options available for database auditing and trade-offs using each. 
(WHITE PAPER) READ ABSTRACT |

10 Best Practices for Reducing the Stress of IT Audits by Dell Software

October 2008 - (Free Research)
This paper presents 10 best practices that can greatly reduce or even eliminate the angst so commonly associated with IT audits. 
(WHITE PAPER) READ ABSTRACT |

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success by Tripwire, Inc.

October 2008 - (Free Research)
As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization. 
(WHITE PAPER) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

How to tackle IT audit and compliance by ComputerWeekly.com

November 2010 - (Free Research)
IT audit is about the formal verification and validation of the quality and effectiveness of ITcontrols to support the overall business control objectives. From a security controlperspective the residual IT security risks are relatively well understood in a networkperimeter protected environment. 
(WHITE PAPER) READ ABSTRACT |

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

Audit Tracking & SOX Compliance by RevSoft

September 2008 - (Free Research)
Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked. 
(WHITE PAPER) READ ABSTRACT |

Preparation by Automation: Reducing the Cost, Pain, Time, and Risk of IT Security Audits by TraceSecurity

March 2008 - (Free Research)
This white paper explains how IT organizations can use automation to better prepare themselves for IT security audits, thereby significantly reducing the cost, pain, time, and risk associated with them. 
(WHITE PAPER) READ ABSTRACT |

The Case for Risk-Based, Business-Aligned Internal Audit by RSA, The Security Division of EMC

December 2010 - (Free Research)
The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks. 
(WHITE PAPER) READ ABSTRACT |

Heinz Uses Wireless Technology to Gain Retail Advantage by BlackBerry

February 2009 - (Free Research)
Heinz wanted to speed up and improve the quality of scorecard information they gathered about Heinz brands in retail stores; so they used the Electronic Retail Audit solution on BlackBerry devices to provide brokers with accurate feedback. 
(CASE STUDY) READ ABSTRACT |

What Changed? Leveraging the Power of Change Auditing by Tripwire, Inc.

December 2008 - (Free Research)
Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis... 
(WHITE PAPER) READ ABSTRACT |

Proactive data security, audit and compliance solutions by IBM

April 2013 - (Free Research)
Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms. 
(WHITE PAPER) READ ABSTRACT |

Mastering software license compliance to reduce costs by Hewlett-Packard Company

June 2014 - (Free Research)
Software license management and software asset management (SAM) are common pain points for many organizations. In this webcast, learn how to simplify and optimize SAM with the right technology and the right processes, as well as how to better prepare for the inevitable audit. 
(WEBCAST) READ ABSTRACT |

Centennial Discovery 2007 by FrontRange Solutions Inc

September 2008 - (Free Research)
Centennial Discovery is an award-winning IT Audit and Inventory management solution designed to improve IT governance by enabling customers to more effectively plan, manage and report on various IT operational disciplines 
(DEMO) READ ABSTRACT |

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability by Tripwire, Inc.

July 2008 - (Free Research)
Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

Technology Audit: Imperva SecureSphere Data Security Suite by Imperva

June 2010 - (Free Research)
Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Database Security and Compliance by Guardium, an IBM Company

February 2008 - (Free Research)
Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts