Auditing Information Security ManagementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Auditing Information Security Management returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis
 •   Security Monitoring
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Access Control
 •   Vulnerability Assessment
 •   Databases

Related Searches
 •   Auditing Automation
 •   Auditing Industry
 •   Auditing Information Methodology
 •   Auditing Information Sales
 •   Auditing Information Security Claims
 •   Cycles Auditing Information Security
 •   Firm Auditing
 •   General Auditing
 •   Planning Auditing Information Security
 •   Spreadsheet Auditing Information
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 03, 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Governance and control: Focus risk management on multiple levers of control by IBM

April 01, 2009 - (Free Research)
Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 18, 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Enterprise UTM Security: The Best Threat Management Solution? by NETGEAR Inc.

December 10, 2010 - (Free Research)
If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise. 
(EGUIDE) READ ABSTRACT |

The CISO's Guide to Virtualization Security by Rapid7

January 12, 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

Quality Assurance Throughout the Clinical Documentation Workflow by Nuance

December 31, 2011 - (Free Research)
How can you successfully manage the clinical documentation creation process in order to maximize quality while also containing costs and ensuring patient confidentiality? This resource introduces a tool that enables you to do just that. Read on to learn more now. 
(WHITE PAPER) READ ABSTRACT |

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by Tripwire, Inc.

May 13, 2010 - (Free Research)
This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Tips on Implementing Database Auditing to Address Security & Compliance Requirements  by IBM

December 03, 2010 - (Free Research)
Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements. 
(BOOK) READ ABSTRACT |

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 07, 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

Information Governance: Audit and Protection on the IBM System z Platform by IBM

November 30, 2011 - (Free Research)
Over the last few years, organizations have realized that their ability to manage their business, remain compliant and mitigate risk will be compromised without 'rock solid' data. Read this white paper to discover the importance of protecting your enterprise information through proper management measures. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 06, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 03, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 04, 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech

August 2008 - (Free Research)
This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform. 
(WHITE PAPER) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

Automating IT Security Audits to Demonstrate Compliance and Protect Data by NetIQ Europe

May 2011 - (Free Research)
This white paper will tell you why IT security auditing is so important, the problems with the current approach to it, and how this product can help you automate your IT security audits. 
(WHITE PAPER) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

System z: Making great security even better by IBM

July 2013 - (Free Research)
Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Database Tools for Auditing and Forensics by IBM

March 2011 - (Free Research)
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance. 
(EGUIDE) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

The CISO's Guide to a Full Night's Sleep by EMC Corporation

April 2014 - (Free Research)
This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance. 
(WHITE PAPER) READ ABSTRACT |

The Intersection of SAM and Security by CDW Corporation

March 2014 - (Free Research)
This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex. 
(WHITE PAPER) READ ABSTRACT |

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.

July 2008 - (Free Research)
In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. 
(WHITE PAPER) READ ABSTRACT |

2010 Information Security & Compliance Trend Study by nCircle

August 2010 - (Free Research)
This report summarizes the results of the nCircle 2010 Information Security and Compliance Trend Study, a cross-industry survey of over 250 respondents in the IT security industry in the United States and Canada. Over 65% of survey respondents are from large and midsize enterprises. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts