it audit

Results 276 - 300 of 359Sort Results By: Published Date | Title | Company Name
Published By: Brainshark     Published Date: Oct 16, 2013
Banking, insurance, securities and investment firms are challenged to keep employees, broker dealers, investors and others current in a world of constant change. Enabling video and mobile communications is the most efficient way to clearly communicate and stay ahead of competitors and changing regulations. Discover how 8 out of the top 10 US financial institutions use Brainshark communications to increase compliance, decrease risks, and lower the costs of communications.
Tags : 
finance, financial services, banking, investment, insurance, broker, credit union, banks, compliance, audit, sales, training, communications, certification, powerpoint, ppt, presentation, training video, partner training, brainshark
    
Brainshark
Published By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed, finance
    
Business Software
Published By: Silk Road Technology     Published Date: Jul 30, 2014
In a recent survey of CEOs by the consulting firm PWC, over half of the executives surveyed said, “lack of talent meant they either cancelled/delayed a strategic initiative, were unable to pursue a market opportunity, or could not innovate effectively.” A talent audit can help your organization avoid those issues and ensure that you have the right talents in the right places at the right times. Today and tomorrow.
Tags : 
silkroad, talent pipeline, audit process, talent audit, strategy, human resources
    
Silk Road Technology
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance, auditing, security audit, audit, sox audit, data protection, storage management, bocada, bocata, sarbanes oxley compliance
    
Bocada
Published By: Core Security     Published Date: Aug 21, 2009
This IDC white paper examines key trends in the vulnerability management and assessment (VA&M) market and identifies the value of penetration testing as part of a comprehensive security methodology.
Tags : 
vulnerability management, security management, idc, vulnerability, vulnerability assessment, security audit, auditing, security, security infrastructure, compliance, security compliance, regulatory compliance, core security, network security, hacker detection, internet security, intrusion detection, intrusion prevention
    
Core Security
Published By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : 
ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy, patient, patient privacy, best practices, hipaa compliance, information management
    
IBM
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Nov 16, 2009
Is your information at risk? Read this whitepaper to find out how the IBM WebSphere MQ FTE solution, built on WebSphere MQ, offers reliable, secure and auditable file transfers.
Tags : 
ibm, ebf, websphere mq, file transfer edition, fte, ftp, application security, business continuity, security management, database security
    
IBM
Published By: PKWARE     Published Date: Aug 21, 2009
The Butler Group provides a technology audit on PKWARE's SecureZIP cross-platform data file security software.
Tags : 
data security, security audit, auditing, compression, data compression, zip file, zip, compress, pkware, application security, encryption
    
PKWARE
Published By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : 
compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management, vulnerability assessment, vulnerability, preventsys, software compliance
    
Preventsys
Published By: Reactivity     Published Date: Aug 21, 2009
The vast majority of IT professionals and business people agree that security is the leading concern for SOA and XML messages and most quickly realize that SSL is limited by not providing content security, auditability or reliability. This paper will discuss how to extend SOA beyond the perimeter through high performance.
Tags : 
soa, web services, xml, service oriented architecture, service-oriented architecture, soa security, xml security, security performance, reactivity, data management, web service security, web service management
    
Reactivity
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega, security, network security, auditing, hacker detection, internet security, intrusion detection, intrusion prevention, security management
    
Aomega
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how to meet regulatory requirements for system change and user activity monitoring with NetIQ Change Guardian for Windows, without the need for performance-hindering native auditing.
Tags : 
pci, pci dss, data protection, compliance, netiq, net iq, change management, monitoring, access control, regulatory compliance, hipaa, fisma, audit, auditing, windows, hipaa compliance
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how delegating administrative privileges can aid in improving administrative productivity, system availability and security, while satisfying the demands of auditors.  Read this new white paper from NetIQ today.
Tags : 
access control, security, audit, auditor, auditing, change management, net iq, netiq, high availability
    
NetIQ Corporation
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
If you are spending too much time and money on SOX compliance, this white paper will help you identify where investments in technology could really pay off in time for your next SOX audit.
Tags : 
compliance, sarbox, sox, sarbanes oxley, sarbanes-oxley, sox compliance, sox audit, change management, access control, softlanding, soft landing, it management, sarbanes oxley compliance
    
SoftLanding Systems
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic, security, it management, firewalls, high availability, identity management, intrusion detection, intrusion prevention, policy based management, security management
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit, web security, cenzic, security, it management, compliance, hacker detection, internet security, security management, security policies, web service security, application integration, best practices
    
Cenzic
Published By: TSFactory     Published Date: Jan 29, 2007
In lieu of Sarbanes-Oxley, HIPAA, and other regulations, one of the main concerns in the IT industry today is security. In this white paper, we take a deeper look at the security concerns, the available solutions, their drawbacks, and a new complementary way of addressing today's security issues.
Tags : 
auditing, windows, compliance, tsfactory, sarbanes-oxley, sox, audit, ts factory, hipaa, security audit, security compliance, windows security, hipaa compliance, sarbanes oxley compliance
    
TSFactory
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru, network attached storage
    
Decru
Published By: GFI     Published Date: Jun 14, 2007
This document shows you how to use GFI LANguard N.S.S. to identify vulnerabilities on your network (excerpt from manual).
Tags : 
vulnerability assessment, vulnerability management, auditing, audit, security management, languard, pki, patch management, security scanner, languard, gfi
    
GFI
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.