Types AuditWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Types Audit returned the following results.
RSS What is RSS?
Related Categories

 •   Automated Security Auditing/ Source Code Analysis
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Security Monitoring
 •   Security Policies
 •   Access Control
 •   Network Management
 •   Network Security
 •   Change and Configuration Management
 •   Telecom Auditing and Expense Management

Related Searches
 •   Computerized Types Audit
 •   Configuration Types Audit
 •   Contact Types Audit
 •   Costs Types Audit
 •   National Types Audit
 •   Types Audit Code
 •   Types Audit Manufacturing
 •   Types Designs
 •   Types Matrix
 •   Types Michigan
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 15, 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

Pervasive Data Profiler v4 by Pervasive Integration

January 2008 - (Free Research)
Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data 
(WHITE PAPER) READ ABSTRACT |

The GeoTAX ® Enterprise Tax Management solution by Pitney Bowes Group 1 Software

The GeoTAX ® Enterprise Tax Management solution provides you with the necessary tools to centralize all your corporate tax jurisdiction processing needs and supports critical tax compliance issues. 
(SOFTWARE PRODUCT)

Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email? by SearchSecurity.com

July 2011 - (Free Research)
With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them. 
(EZINE) READ ABSTRACT |

Preparation by Automation: Reducing the Cost, Pain, Time, and Risk of IT Security Audits by TraceSecurity

March 2008 - (Free Research)
This white paper explains how IT organizations can use automation to better prepare themselves for IT security audits, thereby significantly reducing the cost, pain, time, and risk associated with them. 
(WHITE PAPER) READ ABSTRACT |

Centennial Discovery 2007 by FrontRange Solutions Inc

September 2008 - (Free Research)
Centennial Discovery is an award-winning IT Audit and Inventory management solution designed to improve IT governance by enabling customers to more effectively plan, manage and report on various IT operational disciplines 
(DEMO) READ ABSTRACT |

Best Practices for Database Security and Compliance by Guardium, an IBM Company

February 2008 - (Free Research)
Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees. 
(WEBCAST) READ ABSTRACT |

IBM Rational Asset Manager e-Kit by IBM

March 2009 - (Free Research)
Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture. 
(PRODUCT DEMO) READ ABSTRACT |

ArcSight Logger: Universal Log Management Solution by ArcSight, an HP Company

March 2011 - (Free Research)
ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

AppDetective by Application Security, Inc.

March 2006 - (Free Research)
Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today. 
(TRIAL SOFTWARE)

Active Administrator™, Version 5.6.1 by ScriptLogic Corporation

December 2010 - (Free Research)
Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights. 
(TRIAL SOFTWARE) READ ABSTRACT |

IT Audit Report - EMC IT: Leading the Transformation by EMC Corporation

March 2013 - (Free Research)
A case study of EMCs adoption of cloud computing over the last ten years, this whitepaper documents EMC's advances in cloud computing and the resulting dramatic benefits in company-wide productivity. 
(WHITE PAPER) READ ABSTRACT |

Managed File Transfer: The Need for a Strategic Approach by Inovis

September 2008 - (Free Research)
This paper discusses how business environments are governed by increasingly stringent regulations and consumer demands for privacy. Learn how Managed File Transfer (MFT) can be your solution. 
(WHITE PAPER) READ ABSTRACT |

Optiview Network Analyzer -- Free Hardware Trial by Fluke Networks

February 2009 - (Free Research)
IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection. 
(PRODUCT DEMO)

Get actionable insight with security intelligence for mainframe environments by IBM

March 2013 - (Free Research)
View this white paper to learn more about the importance of alerts with enterprise security. Find out how you can deliver integrated threat analysis, real-time alerts, and audit consolidation to manage today's growing threats. This resource discusses how you can enhance security without increasing overhead. 
(WHITE PAPER) READ ABSTRACT |

Unifying Management of Physical and Electronic Records: The Records Management Imperative by EMC Corporation

March 2008 - (Free Research)
This white paper explains the features and benefits of such a unified approach to enterprise records management, and describes how the EMC Documentum/OmniRIM solution works. 
(WHITE PAPER) READ ABSTRACT |

Is your user management process getting you down? Improving efficiency and security through automation by NetIQ Europe

May 2011 - (Free Research)
Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access. 
(WHITE PAPER) READ ABSTRACT |

AirMagnet WiFi Analyzer by AirMagnet

August 2011 - (Free Research)
AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities. 
(TRIAL SOFTWARE) READ ABSTRACT |

Managing Unstructured Data: 10 Key Requirements by Varonis

August 2007 - (Free Research)
This white paper takes a practical approach to identifying the right enterprise-wide data protection solution for your specific business. Learn more about these ten imperatives to know when evaluating a vendor offering. 
(WHITE PAPER) READ ABSTRACT |

Embarcadero Change Manager 5.0 by Embarcadero Technologies, Inc.

October 2008 - (Free Research)
With Embarcadero Change Manager 5.0 you can simplify and automate database change management, streamline development cycles, and ensure availability, performance, and compliance. Download this demo and experience it for yourself. 
(TRIAL SOFTWARE) READ ABSTRACT |

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC

June 2009 - (Free Research)
This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. 
(WHITE PAPER) READ ABSTRACT |

Decision Management Smarter Insurance Processes by IBM

July 2011 - (Free Research)
With varying compliance demands, change is the mainstay of the insurance industry. There are constant alterations to underwriting, rating, claims processing, fraud detection and billing. Read this case study of the Traveler's implementation of a business rules management system to effectively improve all of their processes. 
(CASE STUDY) READ ABSTRACT |

E-Guide: Monitoring Strategies for Insider Threat Detection by IBM

March 2011 - (Free Research)
In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection. 
(EGUIDE) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts