Information About Audit MethodsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information About Audit Methods returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Security Policies
 •   Security Monitoring
 •   Access Control
 •   Databases
 •   Network Security
 •   Application Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Frameworks Information About
 •   Information About Oregon
 •   Information Payment
 •   Information Risk
 •   Learning Information
 •   Matrix Information
 •   Outsource Information About
 •   Policies Information
 •   Pro Information About Audit
 •   Using Information About Audit
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options by IBM

May 20, 2011 - (Free Research)
Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization. 
(EGUIDE) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 25, 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management Methods and Tools by Symantec Corporation

December 11, 2009 - (Free Research)
IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions. 
(EBOOK) READ ABSTRACT |

Monitoring Trading Partner Agreements - Using Business Intelligence to Enhance BAM Activities by Information Builders

June 01, 2008 - (Free Research)
This white paper will explain what to look for in a complete integration platform and how to use BI technology in conjunction with BAM tools to achieve zero information latency and self-correcting processes. 
(WHITE PAPER) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Leading Pharmaceutical Company Reduces Costs to Meet CFR Compliance Through Digital Signature Implementation by Hexaware Technologies

October 27, 2011 - (Free Research)
In this brief case study, discover eSignature's method of capturing electronic signatures at appropriate points in the work flows, storing relevant information, and enabling an audit trail to be retrieved for each applicable asset. 
(CASE STUDY) READ ABSTRACT |

Implementing Database Security and Auditing: Using Granular Access Control by Guardium, an IBM Company

September 27, 2010 - (Free Research)
In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. 
(WHITE PAPER) READ ABSTRACT |

The GeoTAX ® Enterprise Tax Management solution by Pitney Bowes Group 1 Software

The GeoTAX ® Enterprise Tax Management solution provides you with the necessary tools to centralize all your corporate tax jurisdiction processing needs and supports critical tax compliance issues. 
(SOFTWARE PRODUCT)

Managed File Transfer: The Need for a Strategic Approach by Inovis

September 2008 - (Free Research)
This paper discusses how business environments are governed by increasingly stringent regulations and consumer demands for privacy. Learn how Managed File Transfer (MFT) can be your solution. 
(WHITE PAPER) READ ABSTRACT |

6 Ways Solid Information Management Can Keep You Compliant by Iron Mountain

March 2012 - (Free Research)
Access this resource to learn methods and best practices for information management that IT leaders can implement to improve efficiency, compliance and cost savings, including six steps to greater compliance. 
(WHITE PAPER) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Locating Rogue 802.11n and Legacy Wireless Access Points by Fluke Networks

July 1967 - (Free Research)
Learn more about the omnidirectional and unidirectional search methods for locating rogue access points to improve wireless network security. 
(WHITE PAPER)

Solving the Distributed Data Problem by IBM

July 1967 - (Free Research)
Companies need to reevaluate traditional methods of protecting branch office and PC data such as tape backups and other localized do-it-yourself solutions. Read this white paper to learn about remote on-demand services. 
(WHITE PAPER) READ ABSTRACT |

Are You Prepared for a Software Audit? by CDW Corporation

February 2014 - (Free Research)
Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis... 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Database Tools for Auditing and Forensics by SearchSecurity.com

March 2011 - (Free Research)
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance. 
(EGUIDE) READ ABSTRACT |

Information Governance: Audit and Protection on the IBM System z Platform by IBM

November 2011 - (Free Research)
Over the last few years, organizations have realized that their ability to manage their business, remain compliant and mitigate risk will be compromised without 'rock solid' data. Read this white paper to discover the importance of protecting your enterprise information through proper management measures. 
(WHITE PAPER) READ ABSTRACT |

Audits, Compliance and Security: IT Pros share their experience by Dell Software

May 2014 - (Free Research)
Changes to your Windows environment can be dangerous to your network and applications, but event logging and change reporting can be time-consuming and ineffective. Fortunately, this helpful white paper introduces a way to audit changes from a central web-based console, saving time, reducing risk, and quickly identifying security violations. 
(WHITE PAPER) READ ABSTRACT |

How to tackle IT audit and compliance by ComputerWeekly.com

November 2010 - (Free Research)
IT audit is about the formal verification and validation of the quality and effectiveness of ITcontrols to support the overall business control objectives. From a security controlperspective the residual IT security risks are relatively well understood in a networkperimeter protected environment. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Heinz Uses Wireless Technology to Gain Retail Advantage by BlackBerry

February 2009 - (Free Research)
Heinz wanted to speed up and improve the quality of scorecard information they gathered about Heinz brands in retail stores; so they used the Electronic Retail Audit solution on BlackBerry devices to provide brokers with accurate feedback. 
(CASE STUDY) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

eBook: Best Practices for DB2 on z/OS Performance by BMC Software, Inc.

April 2009 - (Free Research)
This book contains general information about improving performance for DB2 on z/OS and specific information about how BMC products help improve performance. 
(EBOOK) READ ABSTRACT |

E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com

June 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state. 
(EBOOK) READ ABSTRACT |

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts