Computing SarbanesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computing Sarbanes returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Security Policies
 •   Grid/ Utility Computing
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   Security Monitoring
 •   Authentication / Password Management
 •   Network Security

Related Searches
 •   Collection Computing
 •   Computing Case
 •   Computing Creation
 •   Computing Sarbanes Idaho
 •   Computing Sarbanes Suite
 •   Computing Solutions
 •   Computing Vermont
 •   Computing Washington
 •   Databases Computing Sarbanes
 •   Lists Computing Sarbanes
Advertisement

ALL RESULTS
1 - 25 of 491 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Eguide: Top 10 risks in cloud computing and how to stay compliant by SearchSecurity.com

October 03, 2011 - (Free Research)
Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing. 
(EGUIDE) READ ABSTRACT |

Cloud Computing Security: Making Virtual Machines Cloud-Ready by Trend Micro, Inc.

October 20, 2010 - (Free Research)
This paper covers the delivery model of cloud computing that is also called utility computing, or Infrastructure as a Service (IaaS). It looks at the security implications and challenges that IaaS presents and offers best practices to service providers and enterprises hoping to leverage IaaS and so much more. 
(WHITE PAPER) READ ABSTRACT |

Trust in Your Cloud by VMware, Inc.

September 15, 2011 - (Free Research)
Cloud computing is a new model for IT services leveraging the efficient pooling of an on-demand, self managed virtual infrastructure consumed as a service. Working in concert with the security partner ecosystem, VMware is helping businesses of all sizes migrate to secure cloud computing. 
(VIDEO) READ ABSTRACT |

The Path to Securing Enterprise Desktops: From Personal Computers to Personalized Computing by VMware, Inc.

October 2008 - (Free Research)
This IDC white paper considers desktop virtualization, specifically as made available by VMware's VDI and ACE; it also considers the benefits and limitations of these technologies and best use cases, exemplified through user case studies. 
(WHITE PAPER) READ ABSTRACT |

IBM Point of View: Security and Cloud Computing by IBM

January 2011 - (Free Research)
Cloud Computing is easy to deploy, flexible and cost-effective.  As federal agencies continue to outsource data management and operations to third-party cloud providers, their ability to ensure data integrity and privacy is becoming a potential security risk. Read this white paper to learn how you can manage Cloud Computing safely and efficiently. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

What Every Enterprise Should Know About Cloud Computing and eDiscovery by Proofpoint, Inc.

July 2011 - (Free Research)
This paper offers guidelines for evaluating cloud service providers and for defining SLAs that meet the business and IT goals of cloud computing as well as the legal requirements for eDiscovery 
(WHITE PAPER) READ ABSTRACT |

IBM POV: Security & Cloud Computing by IBM

November 2009 - (Free Research)
Read this paper from IBM to see how cloud computing may present an added level of risk because essential services are often outsourced to a third party. Discover how the IBM Security Framework can help you address these key security challenges. 
(WHITE PAPER) READ ABSTRACT |

Cloud-Stored Offsite Database Backups by Oracle Corporation

May 2010 - (Free Research)
Cloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization. 
(WHITE PAPER) READ ABSTRACT |

Zantaz Digital Safe™ Product Family by ZANTAZ

January 2008 - (Free Research)
The ZANTAZ Digital Safe product family has become the solution of choice for leading securities firms, insurance companies and large governmental agencies. 
(WHITE PAPER) READ ABSTRACT |

CW+ Gartner Research: The impact of cloud computing on suppliers in banking by ComputerWeekly.com

July 2010 - (Free Research)
Despite well-publicised concerns regarding security, compliance and data integration issues, banking institutions have begun embracing cloud computing across the services spectrum. 
(WHITE PAPER) READ ABSTRACT |

Compliance and Cloud Security eBook by SearchSecurity.com

July 2011 - (Free Research)
SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing. 
(EBOOK) READ ABSTRACT |

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing by nCircle

March 2009 - (Free Research)
Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations. 
(WHITE PAPER) READ ABSTRACT |

The Need for Cloud Computing Security Standards by SearchSecurity.com

April 2012 - (Free Research)
While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed. 
(EGUIDE) READ ABSTRACT |

Securing and Mitigating Risk in the Cloud by SearchSecurity.com

July 2013 - (Free Research)
Cloud computing offers a number of upsides, but also sparks concerns about securing and mitigating risk in the cloud. Learn more in Modern Infrastructure, CIO Edition. 
(EGUIDE) READ ABSTRACT |

February Technical Guide on Cloud Compliance by SearchSecurity.com

February 2012 - (Free Research)
In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more. 
(EGUIDE) READ ABSTRACT |

E-Guide: Evaluating cloud security concerns by SearchSecurity.com

June 2011 - (Free Research)
The benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions. 
(EGUIDE) READ ABSTRACT |

The 2004 Oversight Systems Financial Executive Report on Sarbanes-Oxley by Oversight Systems

August 2008 - (Free Research)
Through a combination of an invitation-only online survey and survey intercepts, 222 corporate financial leaders from across the U.S. participated in this study on corporate attitudes toward Sarbanes-Oxley compliance. 
(WHITE PAPER) READ ABSTRACT |

A Tour of HP Sarbanes-Oxley IT Assessment by Hewlett-Packard Company

April 2009 - (Free Research)
This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans. 
(WHITE PAPER) READ ABSTRACT |

Essential Guide to PCI DSS by Information Security Magazine

September 2009 - (Free Research)
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more. 
(EGUIDE) READ ABSTRACT |

Using Desktop Virtualization to Drive Quality and Cost Savings in Clinical Computing by Dell, Inc.

August 2011 - (Free Research)
As the healthcare industry seeks to implement and drive widespread adoption of clinical computing, performance and accessibility of applications for clinicians are critical. Learn how solutions such as client virtualization are increasingly playing a role in bridging the gap between available resources and end-user satisfaction. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of Virtualized Desktops and Converged Infrastructure by VCE (E-mail this company)

August 2011 - (Free Research)
Interest in centralized virtual desktop (CVD) has been steadily mounting in recent years, but underlying infrastructure complexity and high costs have prevented CVD from becoming more widespread. However, specialized solutions aimed at solving these core issues have begun to emerge. This paper discusses the benefits of CVD converged infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Choosing a Cloud Provider with Confidence by GeoTrust, Inc.

July 2011 - (Free Research)
In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business. 
(WHITE PAPER) READ ABSTRACT |

Data Sheet: Trend Micro Deep Security 7 by Trend Micro

October 2009 - (Free Research)
This data sheet outlines the benefits of Trend Micro Deep Security, which provides server security in physical, virtual, and cloud computing environments. This comprehensive solution also protects applications, operating systems, web applications, and enterprise systems from attacks. 
(DATA SHEET) READ ABSTRACT |

The Authoritative ID Store Is Dead - How Cloud Changes Provisioning by Intel

October 2011 - (Free Research)
Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 491 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts