Audit Trails White Papers
-
Computer Weekly – 25 August 2020: When algorithms don't play fair
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
-
Best Practices for Mobile Data Protection
Sponsored by: TechTarget SecurityThis expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace the trend toward using personal devices for business.
-
Step by Step: Best practices for security patch management
Sponsored by: TechTarget SecurityWhether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
-
Five Critical Rules for Firewall Management: Lessons from the Field
Sponsored by: Dell SecureWorksThis white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
-
Speed Up Your Business with E-Signatures
Sponsored by: Adobe EchoSignThis white paper shows how IT departments can implement an e-signature solution that will cut down physical paperwork and increase efficiency.
-
ESIGN Act A Well-Established Law Enabling Business Transformation Today
Sponsored by: Adobe EchoSignThis paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
-
How to Create the Most Effective Compliance Program at Your Organization
Sponsored by: IntraLinks, IncIn this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
-
Simplify implementation of the HITRUST Common Security Framework
Sponsored by: Symantec CorporationClick through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
-
Discover How Mail Express Solves 2 of Your Biggest IT Headaches
Sponsored by: GlobalscapeMail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
-
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
Sponsored by: Dell SoftwareThis white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
-
System z: Making great security even better
Sponsored by: IBMAdopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
-
Strategies to Maintain PCI DSS Compliance
Sponsored by: GeoTrust, Inc.This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
-
Virtualization Security: Protecting Virtualized Environments
Sponsored by: TechTarget ComputerWeekly.comThis extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
-
SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know
Sponsored by: IBMToo many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data.
-
Anatomy of an Archiving Project White Paper
Sponsored by: IBMCompanies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests.
-
The Event Data Warehouse- Strategies for Improving Business Performance
Sponsored by: Hexis Cyber Solutions IncOrganizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions.
-
Why Business Rules?: A Case for Business Users of Information Technology
Sponsored by: IBMThis whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
-
Securities and capital markets
Sponsored by: IBMIBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems.
-
Password Self Help – Password Reset for IBM i
Sponsored by: Safestone TechnologiesCheck out this white paper to learn about a self help password application that can give you a high ROI and free up time to work on more business critical issues.
-
E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options
Sponsored by: IBMCreating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization.
-
Distributed Data Capture: Reducing the Cost of Remote Business Processes
Sponsored by: Kofax, Inc.In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process.
-
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
Sponsored by: ImpervaInsider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
-
Case Study: Fortune 100 Insurance Company and Security Weaver
Sponsored by: Security WeaverFor the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.
-
Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
Sponsored by: Security WeaverIn January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
-
E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
Sponsored by: IBMRead this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.