Control Needs Sarbanes-Oxley CorporateWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Control Needs Sarbanes-Oxley Corporate returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Virtualization
 •   Treasury / Cash / Risk Management
 •   Authentication / Password Management
 •   Access Control

Related Searches
 •   Control Accounting
 •   Control Matrix
 •   Control Needs Architecture
 •   Control Needs Budgets
 •   Control Needs Flowchart
 •   Control Needs Sarbanes-Oxley Application
 •   Control Needs Sarbanes-Oxley Connecticut
 •   Directory Control
 •   Utility Control
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Portal Authentication: A Balancing Act Between Security, Usability & Compliance by PistolStar, Inc.

August 25, 2009 - (Free Research)
This white paper discusses the problems with current authentication systems and the drivers that should be motivating organizations of all sizes to improve their access controls. 
(WHITE PAPER) READ ABSTRACT |

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World by Tripwire, Inc.

February 24, 2012 - (Free Research)
In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data. 
(WHITE PAPER) READ ABSTRACT |

How to Protect Your Critical Resources with Identity-based Access Control by AEP Networks

April 2008 - (Free Research)
This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates. 
(WHITE PAPER) READ ABSTRACT |

Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

5 Keys to Developing an Awareness Program by Polivec

April 2008 - (Free Research)
Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program. 
(WEBCAST) READ ABSTRACT |

How to develop cloud applications based on Web app security lessons by Hewlett-Packard Company

April 2013 - (Free Research)
Read this expert guide to get a walk-through on developing secure applications for the cloud, and what controls need to put in place once cloud-based applications are deployed. Find out more about secure development platforms, input filtering, authentication and more. 
(EGUIDE) READ ABSTRACT |

Expert guide: Create a cooling strategy for optimal data center efficiency by Tripp Lite

June 2011 - (Free Research)
This expert resource provides energy-saving tips on how to sidestep server failure and keep your data center online. Also discover strategies and best practices for achieving optimal cooling for high-density racks. 
(EGUIDE) READ ABSTRACT |

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence. 
(WHITE PAPER) READ ABSTRACT |

IOUG 2011 Survey: The Petabyte Challenge: 2011 IOUG Database Growth Survey by Oracle Corporation

October 2011 - (Free Research)
More than 300 database and information security professionals were recently surveyed on their data security practices. The results were disturbing with 60% saying that a data breach is likely over the next 12 months. Download this complimentary copy of the 2011 IOUG Data Security Survey Report and see how your organization measures up. 
(WHITE PAPER)

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs by Tripwire, Inc.

January 2008 - (Free Research)
To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance. 
(WHITE PAPER) READ ABSTRACT |

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

Internal Controls Checklist for Corporate Data Protection and Compliance by SearchSecurity.com

May 2011 - (Free Research)
In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection. 
(EGUIDE) READ ABSTRACT |

The 2004 Oversight Systems Financial Executive Report on Sarbanes-Oxley by Oversight Systems

August 2008 - (Free Research)
Through a combination of an invitation-only online survey and survey intercepts, 222 corporate financial leaders from across the U.S. participated in this study on corporate attitudes toward Sarbanes-Oxley compliance. 
(WHITE PAPER) READ ABSTRACT |

SAP GRC Access Control Solution by HCL Technologies Ltd.

May 2008 - (Free Research)
This white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Disaster Recovery Planning for Health care Providers by Dell Compellent

November 2011 - (Free Research)
For hospitals, timely access to patient data is critical for maintaining normal operations during a natural or man-made disaster. This e-guide will help health care providers create and implement effective disaster recovery and business continuity plans -- complete with advice from providers who had to put those plans into action. 
(EGUIDE) READ ABSTRACT |

E-Guide: Using a virtualized server environment to address HIPAA compliance by Dell Compellent

October 2011 - (Free Research)
In an ever-digitized storage environment, there can be an array of threats posed to patient medical records. Amidst all of these concerns, how can you be sure which virtual server environment is right for you? In this exclusive e-guide, learn how one company successfully took the leap to a virtualized server environment. 
(EGUIDE) READ ABSTRACT |

Planning for virtualized disaster recovery in a health care setting by Dell Compellent

June 2011 - (Free Research)
Server virtualization has proved to be an advantageous in disaster recovery situations because if physical servers have been destroyed, it’s easy to restore backups to virtual hardware. Learn how healthcare facilities can benefit from adding server virtualization to disaster recovery plans, while maintaining compliance. 
(EGUIDE) READ ABSTRACT |

E-Guide: Dynamic and Effective Storage Tiering by Dell Compellent

November 2010 - (Free Research)
With the massive amounts of data that companies are storing, intelligent tiered storage isn't a luxury - it's quickly becoming a necessity. These articles will provide you with three reasons why you should deploy dynamic storage tiering and how to go about organizing your strategy. Download this informative guide to learn more! 
(EGUIDE) READ ABSTRACT |

The 2007 Regulatory Compliance Executive Survey by Polivec

April 2008 - (Free Research)
The findings in this report were taken from 142 respondents to an online survey administered in 2007. Participants were primarily senior business executives and professionals in the compliance and IT fields from a broad array of industries. 
(ANALYST REPORT) READ ABSTRACT |

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility. 
(WHITE PAPER) READ ABSTRACT |

The Role of Password Management in Achieving Compliance by PistolStar, Inc.

June 2008 - (Free Research)
This paper will look at the dramatic impact password management solutions have had on organizations. 
(WHITE PAPER) READ ABSTRACT |

PortalGuard: Strengthening Authentication to Adapt to Changing Circumstances™ by PistolStar, Inc.

August 2009 - (Free Research)
PortalGuard is a password authentication and security solution that allows end-users to authenticate and manage a portal password directly from a Web browser, while providing administrators with functionality to meet or exceed their security objectives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts