ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Audits Research

  • All Qualified Security Assessors Are Not Created Equal

    Sponsored by: AT&T Corp

    The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment

  • Safe & Secure: An Overview of Security Features In JBoss Application Platforms

    Sponsored by: Red Hat

    Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.

  • E-Book: Technical Guide on Network Security Monitoring

    Sponsored by: SearchMidMarketSecurity

    SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.

  • Getting Ahead of Malware

    Sponsored by: Intel

    To minimize the threat of Malware, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches Intel’s user base. Continue reading to learn more.

  • Secure File Transfer Solution Saves Bank Time and Money

    Sponsored by: Linoma Software

    Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.

  • CORE IMPACT Pro V10

    Sponsored by: Core Security Technologies

    Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.

  • 7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction

    Sponsored by: Qualys, Inc.

    Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?

  • The Best PCI Audit of Your Life

    Sponsored by: Lumension

    This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.

  • Symantec Internet Security Threat Report: Trends for 2008

    Sponsored by: Symantec Corporation

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • Information Security Magazine, May 2009: Automating Compliance

    Sponsored by: Information Security Magazine

    This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Addressing Compliance Initiatives with Center for Internet Security Benchmarks

    Sponsored by: Tripwire, Inc.

    This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.

  • Optiview Network Analyzer -- Free Hardware Trial

    Sponsored by: Fluke Networks

    IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • Achieving Compliance in a Virtualized Environment

    Sponsored by: Tripwire, Inc.

    The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.

  • Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment

    Sponsored by: XTS

    This white paper provides an analytical perspective on how to best manage your Citrix environment.

  • Manage Risk and Address Return on Investment with IBM Compliance Solutions

    Sponsored by: IBM Software Group

    Governance, risk management and compliance place high expectations on IT to establish, enforce and prove the efficacy of policies, processes and controls.

  • Online Demo - Vulnerability Management & Policy Compliance Overview

    Sponsored by: Qualys, Inc.

    Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.

  • Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk

    Sponsored by: SecureWave

    This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.

  • Webroot Enterprise Spy Audit

    Sponsored by: Webroot

    Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.

  • Moving on Up

    Sponsored by: Information Security Magazine

    How do you rise in the security ranks? Don't speak geek; use the language of business.

  • Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage

    Sponsored by: Symantec Corporation

    Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.

  • Penetration Tests

    Sponsored by: Internet Security Systems, Inc.

    A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.