RSS feed Get our RSS feed

News by Topic

change audit

Results 1 - 24 of 24Sort Results By: Published Date | Title | Company Name
By: Amazon Web Services     Published Date: Apr 11, 2018
Effectively monitoring and managing cloud infrastructure configuration changes and performing on-going vulnerability analyses through forensics, troubleshooting, audits, and automation are key activities to help secure your AWS environment.
Tags : 
     Amazon Web Services
By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : software asset management, it enterprise, software licensing, mobility, cloud computing, data protection
     CDW
By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : pci, compliant, data, centers, engagement, connect, ecommerce, compliance
     Dell Storage
By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. Many firms are in the early stages of assessing the rule’s impact, sorting through legal interpretations, and preparing for regulatory compliance. To understand who’s affected, what’s changed, and the impact to your business, read the white paper to learn how DocuSign can help you digitize your document agreements and: • Satisfy compliance requirements by enabling you to automate disclosures with a tamper-proof audit trail. • Delight your customers by providing a greatly improved user experience compared to paper-based document transactions. • Meet critical deadlines with rapid implementation using DocuSign’s SaaS-based solution."
Tags : 
     DocuSign
By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Learn about the Sarbanes-Oxley regulatory background and its impact on IT departments. This document provides information pertaining to access issues, change documentation, disaster recovery planning and illustrations of key audit-ready reports.
Tags : sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Learn the importance of change management in today's complex IT infrastructures.
Tags : change management, configuration management, it management, project management, compliance, compliant, audit, auditing
     Ecora Software
By: IBM     Published Date: Oct 30, 2013
Learn how leading companies are using performance management analytics to unlock business value.
Tags : ibm, disclosure management, financial disclosure, risk management, complex reporting, global statutory reporting, financial data, operational data
     IBM
By: IBM Corporation     Published Date: Jun 30, 2011
IBM Tivoli Application Dependency Discovery Manager supports the alignment of IT and business with robust and automated application mapping and discovery that helps organizations understand the impact of change and meet compliance needs with detailed reporting and auditing.
Tags : energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc
     IBM Corporation
By: Idera     Published Date: Jun 21, 2011
SharePoint 2007 was big, and SharePoint 2010 shows every sign of being even bigger. However, there is one stumbling block on the way to SharePoint 2010 nirvana... upgrading. In this white paper, find out ten of the common difficulties you may encounter when upgrading content to SharePoint 2010 and some solutions.
Tags : idera, sharepoint, migration, upgrade, monitor, customization, metadata, populating
     Idera
By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : microsoft, security, best practices, data
     LogRhythm
By: NetIQ     Published Date: Dec 23, 2010
This white paper describes three significant issues with Group Policy change management using native tools and describes a solution for applying best practices for change management.
Tags : netiq, change management, microsoft group policy, compliance auditing, recovery
     NetIQ
By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how to meet regulatory requirements for system change and user activity monitoring with NetIQ Change Guardian for Windows, without the need for performance-hindering native auditing.
Tags : pci, pci dss, data protection, compliance, netiq, net iq, change management, monitoring
     NetIQ Corporation
By: NetWrix Corporation     Published Date: Oct 19, 2010
Don Jones on secrets to implementing lightweight Active Directory change auditing that works
Tags : don jones, netwrix, active directory auditing, active directory change, compliance, it management, change auditing, change management
     NetWrix Corporation
By: Prophix     Published Date: Jun 03, 2016
The paradigm for budgeting has changed. Watch this demo of budgeting with Prophix to learn how to improve organizational agility, gain efficiencies within your department and realize the business value that comes with a budget that is accurate, auditable and collaborative.
Tags : best practices, budgeting, prophix, organizational agility
     Prophix
By: Quest Software     Published Date: Oct 02, 2012
Is your business reactively implementing compliance? If so, you're wasting time and money and destroying productivity.
Tags : compliance, quest, centralized monitoring, reporting, productivity
     Quest Software
By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : security, data security, file share security, sharepoint, file servers, netapp
     Quest Software
By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : change management models, auditing, configuration management, security, change management, network security, efficiency, productivity
     Tripwire
By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
     Tripwire
By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : tripwire, iso, iso 27001, security, compliance, comply, isms, information security
     Tripwire
By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : tripwire, information security, infrastructure, change management, change, change auditing, security
     Tripwire
By: Tripwire     Published Date: Jun 30, 2009
Learn the 5 core competencies of compliance and how to institute an automated compliance solution.
Tags : tripwire, banking, confidence, institution, regulatory, compliance, automated, solution
     Tripwire
By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire Enterprise combines real-time change detection, comprehensive configuration auditing, continuous policy compliance management, and rapid configuration remediation in a single solution. By integrating these Tripwire solutions, you can correlate all suspicious events with changes to take control of threats across all events and changes.
Tags : tripwire enterprise, log and event management, security, compliance, configuration audit, total cost of ownership, tco, siem
     Tripwire, Inc
By: Workday APAC     Published Date: Dec 11, 2018
Finance executives face a variety of challenges—from managing internal controls and closing the books, to onboarding and reporting. Hear from executives on how Workday helps you make smarter decisions, take control of change, and streamline audit and compliance.
Tags : 
     Workday APAC
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics