RSS feed Get our RSS feed

News by Topic

activity logging

Results 1 - 3 of 3Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : technology, virtual, identity management, access control, security, protection
     CA Technologies
By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss
     ArcSight
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the third part of a three-part white paper series. Part 3 describes how to move on from the basic controls and how each organization should decide which, of all the extra security controls available, are right to be brought in next.
Tags : messagelabs us, it security, smb, activity logging, vulnerability check
     Symantec.cloud
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics