Security Audits Research
-
E-Guide: Database Tools for Auditing and Forensics
Sponsored by: TechTarget SecurityThis e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting database performance.
-
Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance
Sponsored by: IntelIn this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.
-
E-Guide: Monitoring Strategies for Insider Threat Detection
Sponsored by: IBMIn this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
-
Database Security Audit and Protect Critical Databases
Sponsored by: ImpervaDatabases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
-
Global Security Report 2011
Sponsored by: TrustwaveIn 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
-
E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
Sponsored by: IBMRead this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.
-
All Qualified Security Assessors Are Not Created Equal
Sponsored by: AT&T CorpThe Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment
-
Safe & Secure: An Overview of Security Features In JBoss Application Platforms
Sponsored by: Red HatSecurity is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
-
E-Book: Technical Guide on Network Security Monitoring
Sponsored by: TechTarget SecuritySearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.
-
Getting Ahead of Malware
Sponsored by: IntelTo minimize the threat of Malware, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches Intel’s user base. Continue reading to learn more.
-
Secure File Transfer Solution Saves Bank Time and Money
Sponsored by: Linoma SoftwareIntegra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.
-
CORE IMPACT Pro V10
Sponsored by: Core Security TechnologiesPlease join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
-
7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
Sponsored by: Qualys, Inc.Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
-
The Best PCI Audit of Your Life
Sponsored by: LumensionThis white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
-
Symantec Internet Security Threat Report: Trends for 2008
Sponsored by: Symantec CorporationThis report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
-
Information Security Magazine, May 2009: Automating Compliance
Sponsored by: Information Security MagazineThis month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
-
Automated Compliance: Making the Case and Reaping the Rewards
Sponsored by: Tripwire, Inc.Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
-
Addressing Compliance Initiatives with Center for Internet Security Benchmarks
Sponsored by: Tripwire, Inc.This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
-
Optiview Network Analyzer -- Free Hardware Trial
Sponsored by: Fluke NetworksIT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
-
Core IMPACT Essential
Sponsored by: Core Security TechnologiesHow do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
-
Achieving Compliance in a Virtualized Environment
Sponsored by: Tripwire, Inc.The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
-
Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
Sponsored by: XTSThis white paper provides an analytical perspective on how to best manage your Citrix environment.
-
Manage Risk and Address Return on Investment with IBM Compliance Solutions
Sponsored by: IBM Software GroupGovernance, risk management and compliance place high expectations on IT to establish, enforce and prove the efficacy of policies, processes and controls.
-
Online Demo - Vulnerability Management & Policy Compliance Overview
Sponsored by: Qualys, Inc.Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
-
Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
Sponsored by: SecureWaveThis article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.