Auditing Existing ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Auditing Existing Resource returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis
 •   Network Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Telecom Auditing and Expense Management
 •   Business Intelligence Solutions

Related Searches
 •   Auditing Basic
 •   Auditing Existing Administration
 •   Auditing Existing Backup
 •   Auditing Existing Improvement
 •   Auditing Guides
 •   Auditing South Carolina
 •   Create Auditing
 •   Info About Auditing
 •   Provider Auditing Existing
 •   Us Auditing Existing
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Using Data Mining to Detect Insurance Fraud by IBM

November 18, 2010 - (Free Research)
Insurers lose millions each year through fraudulent claims. This paper explains how leading insurance companies are using data mining techniques to find fraudulent claims. Read on to learn how to combine powerful analytics with your existing fraud detection and prevention efforts. 
(WHITE PAPER) READ ABSTRACT |

The GeoTAX ® Enterprise Tax Management solution by Pitney Bowes Group 1 Software

The GeoTAX ® Enterprise Tax Management solution provides you with the necessary tools to centralize all your corporate tax jurisdiction processing needs and supports critical tax compliance issues. 
(SOFTWARE PRODUCT)

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing by nCircle

March 02, 2009 - (Free Research)
Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations. 
(WHITE PAPER) READ ABSTRACT |

Empower your Developers by Coverity

May 16, 2011 - (Free Research)
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Heinz Uses Wireless Technology to Gain Retail Advantage by BlackBerry

February 26, 2009 - (Free Research)
Heinz wanted to speed up and improve the quality of scorecard information they gathered about Heinz brands in retail stores; so they used the Electronic Retail Audit solution on BlackBerry devices to provide brokers with accurate feedback. 
(CASE STUDY) READ ABSTRACT |

Panda Security and Minopex - Case Study by Panda Security

July 12, 2013 - (Free Research)
Learn how a mining organization was able to integrate a cloud systems management tool into their existing security solutions to streamline audits, make diagnoses and resolve incidents wherever they are and whenever they arise. 
(CASE STUDY) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

The N-able MSP Sales & Marketing Digital Binder by N-able Technologies

October 03, 2011 - (Free Research)
This digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects. 
(RESOURCE) READ ABSTRACT |

Implementing Database Security and Auditing: Using Granular Access Control by Guardium, an IBM Company

September 27, 2010 - (Free Research)
In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. 
(WHITE PAPER) READ ABSTRACT |

Meeting the True Intent of File Integrity Monitoring by Tripwire, Inc.

October 28, 2010 - (Free Research)
In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of CA Identity Manager by CA Technologies.

February 19, 2010 - (Free Research)
In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). Read this paper to learn what they found. 
(WHITE PAPER) READ ABSTRACT |

Taking Control of Software Licensing by BDNA

April 2008 - (Free Research)
Software licensing is full of complexity and factors outside your control. Having accurate information is the best strategy for managing vendors, negotiating with them, and avoiding vendor audits. This paper offers insight to enter conversation... 
(WHITE PAPER) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

Disaster Recovery with Sunbelt Exchange Archiver by Sunbelt Software

August 2008 - (Free Research)
Sunbelt's Exchange Archiver simplifies disaster recovery by using its revolutionary designed Hierarchical Storage Management (HSM). The HSM store is integrated into the SEA server and redirects archived email into various storage media. 
(WHITE PAPER) READ ABSTRACT |

The Impact of Carrier Ethernet on Service Providers by Dorado Software

September 2009 - (Free Research)
Mobile internet access and the explosive demand for high bandwidth services on mobile devices have created a pivotal point for service providers. Those providers that can meet the new demands while increasing efficiency will be able to increase their market share, while those that are not will lose ground. Read on to learn how to keep up. 
(WHITE PAPER) READ ABSTRACT |

IBM Rational Asset Manager e-Kit by IBM

March 2009 - (Free Research)
Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture. 
(PRODUCT DEMO) READ ABSTRACT |

Is Your Complete Restoration Plan on Track? by Iron Mountain

March 2012 - (Free Research)
Check out this white paper to learn how finding the right storage partner can help you ensure your data is protected and accessible and put your mind at ease. Read on to discover what to look for in an offsite partner, explore key DR concerns to determine how your existing strategy holds up and more. 
(WHITE PAPER) READ ABSTRACT |

Business-Critical Benefits of Workload Automation Solutions by ASG Software Solutions

February 2010 - (Free Research)
Enterprises have struggled with workload automation (WLA) implementation because of its complexities, dependencies, and costs. These obstacles existed primarily because WLA was simply not a mature technology. However, today WLA solutions are widely accessible and achievable. Read this paper to learn about the latest innovations. 
(WHITE PAPER) READ ABSTRACT |

SingTel Selects Alcatel-Lucent as Strategic Partner in IPTV Deployment by Alcatel-Lucent

June 2009 - (Free Research)
Read this case study to learn how SingTel, a major carrier in the Asia-Pacific region, overcame the challenges associated with providing new services and broadening their customer base. The solution allowed them to provide advanced IPTV features - including HD VoD - quickly and at aggressive prices, thereby affirming their place as a market leader. 
(CASE STUDY) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Addressable Advertising Opportunities for Network Operators by Motorola, Inc.

December 2008 - (Free Research)
This paper provides an overview of advanced advertising opportunities and outlines Motorola's commitment to targeted video advertising. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts