Sarbanes Oxley And SmallWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Sarbanes Oxley And Small returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Vulnerability Assessment
 •   Network Security
 •   Authentication / Password Management
 •   Managed Security Services
 •   Automated Security Auditing/ Source Code Analysis

Related Searches
 •   Contact Sarbanes Oxley
 •   Documentation Sarbanes Oxley And
 •   Sarbanes Agency
 •   Sarbanes Codes
 •   Sarbanes Desktops
 •   Sarbanes Oxley And Massachusetts
 •   Sarbanes Oxley And Networks
 •   Sarbanes Oxley Consulting
 •   Sarbanes Oxley Impact
 •   Web-Based Sarbanes Oxley And
Advertisement

ALL RESULTS
1 - 25 of 499 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Closed-loop Records Management: The Stakes Are Too High to Ignore by RSD

February 15, 2012 - (Free Research)
As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

RSA SecurID extension for the IBM System i by Safestone Technologies

October 27, 2010 - (Free Research)
White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment. 
(WHITE PAPER) READ ABSTRACT |

Intacct Financial Management and Accounting System: Product Brochure by Intacct Corporation

March 22, 2010 - (Free Research)
This brochure presents an in-depth look at Intacct’s financial management and accounting sytem and describes all the applications, features, and benefits that come with the system. Continue reading to learn more about Intacct’s financial management and accounting solutions in the cloud. 
(BROCHURE) READ ABSTRACT |

DATA ARCHIVING : The first Step toward Managing the Information Lifecycle by Dolphin

October 19, 2009 - (Free Research)
This whitepaper discusses the business case for data archiving as the first step in an SAP ILM strategy; strategies for Data Archiving, Retention Management and the Retention Warehouse strategy for legacy decommissioning in SAP; and Dolphin's best‐practices approach to an effective, long‐term ILM strategy. 
(WHITE PAPER) READ ABSTRACT |

CW buyer’s guide: managing identity & access by ComputerWeekly.com

August 16, 2013 - (Free Research)
This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the business and regulators. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Five Procurement Guidelines You Can't Afford to Ignore by StarCite

August 2008 - (Free Research)
Here is a list of 5 guidelines that companies should keep in mind as they create their spend management program: Data Consolidation, Preferred Vendor Program, Legal Oversight, Company-wide Visibility and Coordination. 
(WHITE PAPER) READ ABSTRACT |

Backup Express and NetApp: A Better Backup and Recovery Solution by Syncsort

August 2008 - (Free Research)
The new technology which fulfills the ambitious goal combines the benefits of disk-based backup, continuous blocklevel incremental backup, synthesized virtual base and file-level restore. 
(WHITE PAPER) READ ABSTRACT |

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Why Should Companies Take a Closer Look at Business Continuity Planning? by Datalink

May 2010 - (Free Research)
Over the last 30 years, companies have significantly changed their approach to ensuring that their businesses can continue to run in the event of a catastrophe. Read this white paper to learn how business continuity and disaster recovery solutions can help you to develop a more robust enterprise. 
(WHITE PAPER) READ ABSTRACT |

The Top 10 Reasons to Automate Your AP Processes by Kofax, Inc.

September 2010 - (Free Research)
This white paper examines in detail the relevant issues and benefits of Accounts Payable (AP) transformation as well as recent industry-wide research and best practices around such initiatives. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Steps to Protecting Your Organization’s Privacy Data by McAfee, Inc.

March 2010 - (Free Research)
Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution. 
(WHITE PAPER) READ ABSTRACT |

Improving Intercompany Reconciliation for a Faster Close by SAP America, Inc.

June 2009 - (Free Research)
What's arguably the single greatest barrier to the fast close has remained constant - the completion of the intercompany reconciliation process. This paper examines the issues behind intercompany reconciliation and outlines how companies can make impressive progress when they employ software solutions such as those from SAP Business Objects 
(WHITE PAPER) READ ABSTRACT |

Network Security for Small Business by Cisco Systems, Inc.

September 2008 - (Free Research)
Achieving effective network security for small business requires a solution designed to fit your needs today and can adapt to tomorrow's threats. This paper examines how best to protect your network, as well as the benefits a secure environment offers. 
(WHITE PAPER) READ ABSTRACT |

Nine Steps to Smart Security for Small Businesses by Qualys

October 2011 - (Free Research)
This guide uncovers nine simple steps for implementing smart security for your business. View now to explore why firewalls and anti-virus are not enough, and how to reduce risk while cutting costs. 
(WHITE PAPER) READ ABSTRACT |

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing by nCircle

March 2009 - (Free Research)
Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations. 
(WHITE PAPER) READ ABSTRACT |

The 2004 Oversight Systems Financial Executive Report on Sarbanes-Oxley by Oversight Systems

August 2008 - (Free Research)
Through a combination of an invitation-only online survey and survey intercepts, 222 corporate financial leaders from across the U.S. participated in this study on corporate attitudes toward Sarbanes-Oxley compliance. 
(WHITE PAPER) READ ABSTRACT |

A Tour of HP Sarbanes-Oxley IT Assessment by Hewlett-Packard Company

April 2009 - (Free Research)
This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans. 
(WHITE PAPER) READ ABSTRACT |

Addressing Compliance Initiatives with Center for Internet Security Benchmarks by Tripwire, Inc.

January 2009 - (Free Research)
This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Selecting a SIM for midmarket business by SearchSecurity.com

October 2011 - (Free Research)
This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine - October 2009: Security 7 Awards by Information Security Magazine

October 2009 - (Free Research)
The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more. 
(EZINE)

15 Minutes to a Secure Business: Daily Practices for IT Security Management by McAfee, Inc.

December 2008 - (Free Research)
Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall. 
(ARTICLE) READ ABSTRACT |

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM) by BeyondTrust Corporation

May 2010 - (Free Research)
This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Five Ways to Improve Your Company's Efficiency by Cisco Systems, Inc.

February 2008 - (Free Research)
According to IDC research, 60.2% of SMBs cited improving efficiency as their top business priority in 2005. Read this article to find tips for enhancing efficiency. 
(ARTICLE) READ ABSTRACT |

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market by ArcSight, an HP Company

March 2011 - (Free Research)
This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 499 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts