Small AuditWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Small Audit returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Enterprise Data Protection and Privacy
 •   Database Administration
 •   Security Monitoring
 •   Telecom Auditing and Expense Management
 •   Databases
 •   Access Control
 •   Change and Configuration Management

Related Searches
 •   Configuration Small Audit
 •   Framework Small Audit
 •   Internet-Based Small Audit
 •   Issues Small Audit
 •   Latest Small Audit
 •   New Small Audit
 •   Regional Small Audit
 •   Small Audit Specialist
 •   Small Statements
 •   Webcast Small
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 03, 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability by Tripwire, Inc.

July 2008 - (Free Research)
Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization. 
(WHITE PAPER) READ ABSTRACT |

What Changed? Leveraging the Power of Change Auditing by Tripwire, Inc.

December 2008 - (Free Research)
Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed. 
(PRODUCT OVERVIEW) READ ABSTRACT |

CW+: How to manage expenses in small and mid-sized businesses by ComputerWeekly.com

October 2010 - (Free Research)
More than ever, small businesses need to efficiently control costs and optimise cash flow, but how, and what role does automation play in this process? 
(WHITE PAPER) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

The 10 most overlooked payroll pitfalls by Ultimate Software

February 2011 - (Free Research)
While most common payroll process errors are avoidable, they are also easily overlooked. Unfortunately even the smallest errors can lead to long-term issues and increased expenses. Read more to find out the top 10 payroll pitfalls and how to prevent them. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

10 Things IT Should Be Doing (but isn't) by Varonis

September 2008 - (Free Research)
Check out this brief paper to learn the ten must-do actions for maximizing unstructured data protection. 
(WHITE PAPER) READ ABSTRACT |

Release Management: Closing the Gap in Application Lifecycle Management by SERENA Software, Inc.

January 2011 - (Free Research)
Businesses are struggling to keep up with the massive amount of change to their software applications. By strategically automating release management, companies can create a crisp, accurate Release Management function that dramatically boosts the competitive edge gained from application change. Control application change or let it control you. 
(WHITE PAPER) READ ABSTRACT |

Effective print security for SMBs by ComputerWeekly.com

April 2013 - (Free Research)
Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security. 
(ANALYST REPORT) READ ABSTRACT |

IP Telephony from A-Z -- The Complete IP Telephony eBook by ShoreTel

December 2007 - (Free Research)
Check out this comprehensive eBook to discover the ins and outs of IP telephony system selection, deployment, and management. 
(EBOOK) READ ABSTRACT |

CISO Guide to Next Generation Threats by FireEye

May 2011 - (Free Research)
The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones 
(WHITE PAPER) READ ABSTRACT |

Genesis Wireless Brings Service to Resort, Builds Revenue by Motorola, Inc.

May 2008 - (Free Research)
Check out this brief case study to learn how Genesis Wireless implemented Motorola wireless broadband solutions to produce significant cost savings and provide enhanced reliability. 
(WHITE PAPER) READ ABSTRACT |

Anticipating the Bandwidth Bottleneck by Motorola, Inc.

December 2008 - (Free Research)
This paper examines trends in consumer content consumption and projects the future bandwdith requirements of broadband connections to the home. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com

November 2010 - (Free Research)
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues. 
(EBOOK)

App stores and developer programs everywhere: What is the right application enablement approach for you? by Alcatel-Lucent

August 2010 - (Free Research)
A growing number of network providers are investing to speed the delivery of new services to an increasingly more demanding consumer and enterprise market. One strategy is to better support the delivery of third party applications. Read this paper to find out so much more. Read this paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

Addressing Compliance Initiatives with Center for Internet Security Benchmarks by Tripwire, Inc.

January 2009 - (Free Research)
This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Provisioning Databases for Test and Development by Informatica

January 2009 - (Free Research)
Best practices and new technologies available for provisioning databases for test and development environments are outlined in this white paper. Using this as a guide, organizations can save time and resources, meet regulatory compliance standards, and streamline database provisioning processes for test and development environments. 
(WHITE PAPER) READ ABSTRACT |

Active Directory Auditing: What It Is, and What It Isn’t by Dell Software

February 2013 - (Free Research)
This white paper discusses the problems that stem from Active Directory (AD) native audit loggings, the functionalities you really need from your AD auditing solution for efficient management. 
(WHITE PAPER) READ ABSTRACT |

Automating IT Security Audits to Demonstrate Compliance and Protect Data by NetIQ Europe

May 2011 - (Free Research)
This white paper will tell you why IT security auditing is so important, the problems with the current approach to it, and how this product can help you automate your IT security audits. 
(WHITE PAPER) READ ABSTRACT |

Better Active Directory Auditing...Less Overhead, More Power by Netwrix Corporation

July 2010 - (Free Research)
Today’s stringent legislative and industry requirements Windows server auditing simpler, more reliable, and better able to meet their business requirements. organizations – faced with stricter internal security policies as well as– continue to struggle to make. 
(WHITE PAPER) READ ABSTRACT |

Configuration Auditing – The Next Critical Step in Compliance by nCircle

August 2010 - (Free Research)
In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts