ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Audits Research

  • E-Guide: Database Tools for Auditing and Forensics

    Sponsored by: TechTarget Security

    This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.

  • Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance

    Sponsored by: Intel

    In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Sponsored by: IBM

    In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

  • Database Security Audit and Protect Critical Databases

    Sponsored by: Imperva

    Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.

  • Global Security Report 2011

    Sponsored by: Trustwave

    In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.

  • E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security

    Sponsored by: IBM

    Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.

  • All Qualified Security Assessors Are Not Created Equal

    Sponsored by: AT&T Corp

    The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment

  • Safe & Secure: An Overview of Security Features In JBoss Application Platforms

    Sponsored by: Red Hat

    Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.

  • E-Book: Technical Guide on Network Security Monitoring

    Sponsored by: TechTarget Security

    SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.

  • Getting Ahead of Malware

    Sponsored by: Intel

    To minimize the threat of Malware, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches Intel’s user base. Continue reading to learn more.

  • Secure File Transfer Solution Saves Bank Time and Money

    Sponsored by: Linoma Software

    Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.

  • CORE IMPACT Pro V10

    Sponsored by: Core Security Technologies

    Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.

  • 7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction

    Sponsored by: Qualys, Inc.

    Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?

  • The Best PCI Audit of Your Life

    Sponsored by: Lumension

    This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.

  • Symantec Internet Security Threat Report: Trends for 2008

    Sponsored by: Symantec Corporation

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • Information Security Magazine, May 2009: Automating Compliance

    Sponsored by: Information Security Magazine

    This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Addressing Compliance Initiatives with Center for Internet Security Benchmarks

    Sponsored by: Tripwire, Inc.

    This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.

  • Optiview Network Analyzer -- Free Hardware Trial

    Sponsored by: Fluke Networks

    IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • Achieving Compliance in a Virtualized Environment

    Sponsored by: Tripwire, Inc.

    The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.

  • Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment

    Sponsored by: XTS

    This white paper provides an analytical perspective on how to best manage your Citrix environment.

  • Manage Risk and Address Return on Investment with IBM Compliance Solutions

    Sponsored by: IBM Software Group

    Governance, risk management and compliance place high expectations on IT to establish, enforce and prove the efficacy of policies, processes and controls.

  • Online Demo - Vulnerability Management & Policy Compliance Overview

    Sponsored by: Qualys, Inc.

    Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.

  • Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk

    Sponsored by: SecureWave

    This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.