ComputerWeekly.com Research Library

Powered by Bitpipe.com

Audit Trails Research

  • Step by Step: Best practices for security patch management

    Sponsored by: SearchSecurity.com

    Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.

  • Top-10 Guide for Protecting Sensitive Data from Malicious Insiders

    Sponsored by: Imperva

    Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.

  • Case Study: Fortune 100 Insurance Company and Security Weaver

    Sponsored by: Security Weaver

    For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.

  • Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver

    Sponsored by: Security Weaver

    In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.

  • E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security

    Sponsored by: IBM

    Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.

  • ASG-Discovery and Dependency Mapping (ASG-DDM)™

    Sponsored by: ASG Software Solutions

    Understanding which hardware and software components support which business systems is extremely difficult. For many years, the clipboard and spreadsheet appear to have been the tools of choice, with the result that many decisions were made based on outdated and inaccurate information. Read this paper to find out more.

  • Securing Virtualized Data Centers

    Sponsored by: Trend Micro, Inc.

    On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.

  • Role Based Access Control and Entitlement Management

    Sponsored by: FoxT

    The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.

  • Audit Tracking & SOX Compliance

    Sponsored by: RevSoft

    Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.

  • Unifying Management of Physical and Electronic Records: The Records Management Imperative

    Sponsored by: EMC Corporation

    This white paper explains the features and benefits of such a unified approach to enterprise records management, and describes how the EMC Documentum/OmniRIM solution works.

Browse by Report Type: Audit Trails White Papers | Audit Trails Multimedia | Audit Trails IT Downloads

See more topics related to: Audit Trails

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.