ComputerWeekly.com Research Library

Powered by Bitpipe.com

Audit Trails Research

  • E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security

    Sponsored by: IBM

    Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.

  • ASG-Discovery and Dependency Mapping (ASG-DDM)™

    Sponsored by: ASG Software Solutions

    Understanding which hardware and software components support which business systems is extremely difficult. For many years, the clipboard and spreadsheet appear to have been the tools of choice, with the result that many decisions were made based on outdated and inaccurate information. Read this paper to find out more.

  • Securing Virtualized Data Centers

    Sponsored by: Trend Micro, Inc.

    On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.

  • Role Based Access Control and Entitlement Management

    Sponsored by: FoxT

    The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.

  • Audit Tracking & SOX Compliance

    Sponsored by: RevSoft

    Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.

  • Unifying Management of Physical and Electronic Records: The Records Management Imperative

    Sponsored by: EMC Corporation

    This white paper explains the features and benefits of such a unified approach to enterprise records management, and describes how the EMC Documentum/OmniRIM solution works.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.