Tracking Sarbanes-OxleyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Tracking Sarbanes-Oxley returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Business Process Management (BPM)
 •   Security Policies
 •   Treasury / Cash / Risk Management
 •   Security Monitoring
 •   Business Intelligence Solutions
 •   Enterprise Resource Planning (ERP)
 •   Automated Security Auditing/ Source Code Analysis

Related Searches
 •   Calendar Tracking Sarbanes-Oxley
 •   Enterprise Tracking Sarbanes-Oxley
 •   Flowchart Tracking Sarbanes-Oxley
 •   General Tracking
 •   Graph Tracking
 •   Organization Tracking Sarbanes-Oxley
 •   Tracking Sarbanes-Oxley Distribution
 •   Tracking Sarbanes-Oxley Provider
 •   Webinars Tracking Sarbanes-Oxley
Advertisement

ALL RESULTS
1 - 25 of 498 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs by Tripwire, Inc.

January 08, 2008 - (Free Research)
To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance. 
(WHITE PAPER) READ ABSTRACT |

Information Governance Perspectives from RSD: E-mail Archiving by RSD

August 17, 2009 - (Free Research)
With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions 
(WHITE PAPER) READ ABSTRACT |

Revamping and optimizing your SAP GRC strategy by Security Weaver

November 08, 2010 - (Free Research)
GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy. 
(EBOOK)

Audit Tracking & SOX Compliance by RevSoft

September 2008 - (Free Research)
Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked. 
(WHITE PAPER) READ ABSTRACT |

CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program by Qualys, Inc.

May 2008 - (Free Research)
CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations. 
(CASE STUDY) READ ABSTRACT |

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

3 undeniable use cases for automated IAM controls by IBM

January 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

Do You Know Where Your Assets Are? Maximizing ROI With Radio Frequency Identification (RFID) Asset Management by Intermec

March 2009 - (Free Research)
This white paper examines asset tracking with RFID technology by providing a brief overview of technologies available, an explanation of how passive UHF RFID can be used for asset tracking, an exploration of who's using RFID, a discussion on deciding what to track and making a business case for RFID, and a guide to choosing the right RFID partners. 
(WHITE PAPER) READ ABSTRACT |

Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console by Oracle Corporation

October 2008 - (Free Research)
This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications. 
(WHITE PAPER) READ ABSTRACT |

Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance by Ipswitch File Transfer

May 2013 - (Free Research)
This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements. 
(CASE STUDY) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

Center for Charter Schools at Central Michigan University Uses DocAve to Migrate Mission-Critical SharePoint Data by AvePoint, Inc.

February 2010 - (Free Research)
The Center for Charters at CMU needed a unified platform upon which to collaborate effectively, store digital assets efficiently, and maintain industry compliant audit histories. Read this case study to learn how they used DocAve SharePoint Migrator for a hassle-free migration into MOSS with no metadata loss. 
(CASE STUDY) READ ABSTRACT |

Essential Guide to SIMs Strategy by Information Security Magazine

October 2010 - (Free Research)
Take an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more. 
(EGUIDE) READ ABSTRACT |

Controlling Wireless Costs with any Connection Reporting: Supporting Three Dimensions of Mobile Intelligence by Fiberlink Communications

March 2010 - (Free Research)
In this white paper we will provide a general overview of Any Connection Reporting. We will then look at specific applications of this technology and see how organizations can use it to solve problems 3G, connectivity plans and so much more. 
(WHITE PAPER) READ ABSTRACT |

PortalGuard: Strengthening Authentication to Adapt to Changing Circumstances™ by PistolStar, Inc.

August 2009 - (Free Research)
PortalGuard is a password authentication and security solution that allows end-users to authenticate and manage a portal password directly from a Web browser, while providing administrators with functionality to meet or exceed their security objectives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Enhancing Business Process Management with Business Rules by FICO

May 2010 - (Free Research)
While a business process management system can save time and cut costs by governing process, it can’t decide what to do, given a particular circumstance. A business rules management system enables the right decisions to be made quickly. This white paper uses case studies to illustrate the value of adding rules to BPM. 
(WHITE PAPER) READ ABSTRACT |

Validation Process and Compliance Support with IBM Maximo Asset Management in Regulated Industries by IBM

December 2010 - (Free Research)
While there is no single method to guarantee software compliance, IBM Maximo® Asset Management can provide e-signature and e-record (audit trail) capabilities that support efforts to comply with regulations and guidelines related to e-records and e-signatures. 
(WHITE PAPER) READ ABSTRACT |

Trust and security in the cloud by ComputerWeekly.com

February 2011 - (Free Research)
This study from analyst Freeform Dynamics gives guidance on security for organisations considering Software as a service. 
(ANALYST BRIEF) READ ABSTRACT |

Software Licensing and Subscription by ComputerWeekly.com

August 2011 - (Free Research)
This research from Freeform Dynamics, based on a survey of end users,  identifies the challenges faced by IT departments and suppliers on software licensing, and offers advice to organisations on dealing with software licensing. 
(ANALYST BRIEF) READ ABSTRACT |

Meaningful Use Check-Up: Best Practices for Mobile Health, Cloud Computing and Disaster Preparedness by SearchHealthIT.com

December 2011 - (Free Research)
Interact with leading healthcare compliance and IT experts from across the U.S. in this free, one-day virtual seminar. Learn best practices for cloud computing and disaster preparedness, as well as how to achieve federal EHR reimbursements. 
(VIRTUAL TRADE SHOW) READ ABSTRACT |

Unified Physical Infrastructure℠ Solutions for the Data Center A Service Management Approach to IT Physical Infrastructure Management by Panduit

September 2010 - (Free Research)
This white paper discusses how a DCIM solution based on the Unified Physical InfrastructureSM (UPI) approach brings visibility to the physical infrastructure components that support mission critical services. Armed with this solution, data center stakeholders have a more powerful service management toolset and so much more 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization by Intel

May 2011 - (Free Research)
Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

PCI DSS Compliance in the UNIX/Linux Datacenter Environment by BeyondTrust Corporation

February 2009 - (Free Research)
Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization. 
(WHITE PAPER) READ ABSTRACT |

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing by nCircle

March 2009 - (Free Research)
Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 498 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts