RSS feed Get our RSS feed

News by Topic

audit compliance

Results 76 - 100 of 104Sort Results By: Published Date | Title | Company Name
By: Splunk Inc.     Published Date: Jun 02, 2009
Compliance is high on the IT agenda today, yet no one seems to have a clear picture of what it really involves. Inconsistent interpretation by different auditors, regulators and vendors means what worked in one year's audit could fail in the next. This whitepaper is designed to help Demystify Compliance as it relates to IT and give you some simple recipes for analyzing your own environment in the light of specific mandates.
Tags : compliance, splunk, it agenda, it security, regulations, proof-of-compliance, pci, hipaa
     Splunk Inc.
By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : software license, automate, reclaim licenses, compliance, improve, risk management
     IBM
By: Qualys     Published Date: May 07, 2014
Learn how to easily pass an audit and see how you can better prepare the analyst in charge to be more productive by focusing time on analyzing the data and staying ahead of the audit curve.
Tags : qualys, it audit, it security, compliance, secure data, pass audit, prepare for audit
     Qualys
By: Quest Software     Published Date: Oct 02, 2012
Your business relies on Active Directory, so you must regularly audit and monitor it to meet security and compliance requirements. But native auditing tools can't do the job alone.
Tags : audit, quest, compliance, security, auditing tools, compliance requirements, active directory
     Quest Software
By: Core Security     Published Date: Aug 21, 2009
This IDC white paper examines key trends in the vulnerability management and assessment (VA&M) market and identifies the value of penetration testing as part of a comprehensive security methodology.
Tags : vulnerability management, security management, idc, vulnerability, vulnerability assessment, security audit, auditing, security
     Core Security
By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata
     IBM
By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management
     Preventsys
By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing
     Aomega
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance
     Cenzic
By: TSFactory     Published Date: Jan 29, 2007
In lieu of Sarbanes-Oxley, HIPAA, and other regulations, one of the main concerns in the IT industry today is security. In this white paper, we take a deeper look at the security concerns, the available solutions, their drawbacks, and a new complementary way of addressing today's security issues.
Tags : auditing, windows, compliance, tsfactory, sarbanes-oxley, sox, audit, ts factory
     TSFactory
By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
     Decru
By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Better preparation means better results – Learn how to prepare for an audit; how to develop a self-audit process; how to develop a security template; and much more.
Tags : security audit, audit, auditing, vulnerability assessment, vulnerability management, infrastructure, patch, patch management
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Learn about the Sarbanes-Oxley regulatory background and its impact on IT departments. This document provides information pertaining to access issues, change documentation, disaster recovery planning and illustrations of key audit-ready reports.
Tags : sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Our guide shows you how automation can create a sustainable control and reporting system – a must-have with mandated quarterly and annual assessments. If you've already prepared for, and experienced, your first Sarbanes-Oxley audit, you'll want to read this guide on sustainability.
Tags : sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
     Ecora Software
By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil
     Ecora Software
By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing
     Netwrix
By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis
     Intellitactics
By: NetWrix Corporation     Published Date: Oct 19, 2010
Don Jones on secrets to implementing lightweight Active Directory change auditing that works
Tags : don jones, netwrix, active directory auditing, active directory change, compliance, it management, change auditing, change management
     NetWrix Corporation
By: NetIQ     Published Date: Jan 12, 2011
This white paper discusses the growing demand for IT security auditing and why current approaches-manual procedures, scripts, and network vulnerability scanners- fail.
Tags : netiq, automating it security, audit, compliance, data protection, network vulnerability, secure configuration manager tool, automation
     NetIQ
By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
     NetIQ
By: Liaison Technologies     Published Date: Jun 03, 2011
This paper explores the use of tokenization as a best practice in improving the security of credit card transactions, while at the same time minimizing the headaches and angst associated with PCI DSS compliance.
Tags : liaison, nubridges, gary palgon, dss audit scope, cardholder data, pci dss compliance, tokenization, tokens
     Liaison Technologies
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics