Research About Audits CaterpillarWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research About Audits Caterpillar returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Security Policies
 •   Network Security
 •   Treasury / Cash / Risk Management
 •   Access Control
 •   Application Security

Related Searches
 •   Download Research About
 •   Faqs Research About Audits
 •   Net Research
 •   Price Research
 •   Regional Research About
 •   Research About Audits Cycle
 •   Research About Audits Idaho
 •   Research About Audits Techniques
 •   Research Maryland
 •   Statistics Research About Audits
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 03, 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

Beyond the Security Breach: Protecting Sensitive Data Using Encryption & Key Management by Linoma Software

February 10, 2009 - (Free Research)
This paper identifies how organizations need to deploy new solutions to protect their information assets from theft and misuse, it also explores the landscape of legal liabilities and identifies the technical hurdle facing both management and IT. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance: Are UK Businesses Ready? by Tripwire, Inc.

April 09, 2010 - (Free Research)
As of September 30, 2010, the Payment Card Industry Data Security Standard (PCI DSS) will apply to organizations in the UK. Recent research reveals that so far only 12 percent of UK organizations that handle credit card data currently have been certified PCI compliant. Read on to learn how your organization should be preparing for September 30th. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 07, 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 01, 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

Managing Unstructured Data: 10 Key Requirements by Varonis

August 2007 - (Free Research)
This white paper takes a practical approach to identifying the right enterprise-wide data protection solution for your specific business. Learn more about these ten imperatives to know when evaluating a vendor offering. 
(WHITE PAPER) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

The GeoTAX ® Enterprise Tax Management solution by Pitney Bowes Group 1 Software

The GeoTAX ® Enterprise Tax Management solution provides you with the necessary tools to centralize all your corporate tax jurisdiction processing needs and supports critical tax compliance issues. 
(SOFTWARE PRODUCT)

Printing: a false sense of security? by ComputerWeekly.com

August 2013 - (Free Research)
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. 
(ANALYST REPORT) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Database Tools for Auditing and Forensics by IBM

March 2011 - (Free Research)
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance. 
(EGUIDE) READ ABSTRACT |

Trends in Enterprise Mobility by ComputerWeekly.com

April 2013 - (Free Research)
This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Demystifying ROI for Managed Services for IPT (IP Telephony) by Dimension Data

July 2009 - (Free Research)
If you're looking to better manage your IP telephony but don't know where to start, this presentation transcript, taken from the webcast of the same name, can help. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How to tackle IT audit and compliance by ComputerWeekly.com

November 2010 - (Free Research)
IT audit is about the formal verification and validation of the quality and effectiveness of ITcontrols to support the overall business control objectives. From a security controlperspective the residual IT security risks are relatively well understood in a networkperimeter protected environment. 
(WHITE PAPER) READ ABSTRACT |

Are You Prepared for a Software Audit? by CDW Corporation

February 2014 - (Free Research)
Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance. 
(WHITE PAPER) READ ABSTRACT |

Information Governance: Business Imperative or Technology Asset? by Iron Mountain

May 2012 - (Free Research)
In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals. 
(EBRIEF) READ ABSTRACT |

What Changed? Leveraging the Power of Change Auditing by Tripwire, Inc.

December 2008 - (Free Research)
Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Governance and control: Focus risk management on multiple levers of control by IBM

April 2009 - (Free Research)
Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior. 
(WHITE PAPER) READ ABSTRACT |

Audit Tracking & SOX Compliance by RevSoft

September 2008 - (Free Research)
Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked. 
(WHITE PAPER) READ ABSTRACT |

Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email? by SearchExchange.com

July 2011 - (Free Research)
With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them. 
(EZINE)

Heinz Uses Wireless Technology to Gain Retail Advantage by BlackBerry

February 2009 - (Free Research)
Heinz wanted to speed up and improve the quality of scorecard information they gathered about Heinz brands in retail stores; so they used the Electronic Retail Audit solution on BlackBerry devices to provide brokers with accurate feedback. 
(CASE STUDY) READ ABSTRACT |

Best Practices for Database Security and Compliance by Guardium, an IBM Company

February 2008 - (Free Research)
Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts