audit

Results 326 - 350 of 465Sort Results By: Published Date | Title | Company Name
By: Tripwire     Published Date: Jun 30, 2009
Learn the 5 core competencies of compliance and how to institute an automated compliance solution.
Tags : tripwire, banking, confidence, institution, regulatory, compliance, automated, solution
     Tripwire
By: Tripwire     Published Date: Jun 30, 2009
Understand the issues addressed by the new international banking standard known as the Basel Committee on Banking Supervision (BCBS or Basel II), and find out how Tripwire can help meet all requirements of Basel II compliance even before it becomes a worldwide banking regulation.
Tags : tripwire, basel ii, compliance, banking, standard, committee bcbs, banking supervision, supervision
     Tripwire
By: Tripwire     Published Date: Jun 30, 2009
Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.
Tags : tripwire, glba, compliance, managers, officers, directors, financial, institutions
     Tripwire
By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : tripwire, information security, audit fatigue, compliance, security risk, auditing, risk management, information management
     Tripwire
By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing
     Tripwire
By: Tripwire     Published Date: Apr 21, 2010
Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.
Tags : tripwire, pci dss compliance, it security, automation solution, payment card industry, data security standard, audit, auditing
     Tripwire
By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems, security, business intelligence, risk management
     IBM
By: IBM     Published Date: Feb 24, 2015
Read this report from Forrester Research to learnhow IBM ACM solutions improve the efficiency of knowledge workers, integrate with analytics to create upselling and cross-selling opportunities and reduce the cost and risk of regulatory fines through increased audit consistency.
Tags : ibm, acm solutions, cross-selling opportunities, audit consistency, it management, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Jul 15, 2016
This Market Guide helps CISOs identify emerging data-centric audit and protection tools. IBM is positioned with a centralized management console approach across multiple silos and has coverage of all the key capabilities evaluated by Gartner.
Tags : ibm, gartner, data, dcap, data-centric audit protection, security, knowledge management, enterprise applications
     IBM
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
     Group M_IBM Q418
By: Bulldog Solutions     Published Date: Jul 20, 2009
With competition growing for your prospects’ attention, it’s never been more important to create powerful messaging that builds a bridge between an issue that’s on their minds and your company’s solution or service. This white paper outlines three steps for creating relevant messages and effective calls to action.
Tags : calls to action, bds, bulldog solutions, messaging, planning, promotion planning, lead gen, topics
     Bulldog Solutions
By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : iag, project management, project management, maturity, consulting, business requirements, business intelligence, business management
     IAG Consulting
By: IAG Consulting     Published Date: Jan 28, 2012
The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : iag, business, evaluation, technology, successful projects, application integration, business analytics, business integration
     IAG Consulting
By: VeriSign Incorp.     Published Date: Jan 15, 2008
Provide your users with visual cues that indicate your site is secure. Extended Validation SSL can facilitate online commerce by increasing visitor confidence and reducing the effectiveness of phishing attacks.
Tags : shopping online, ssl certificate, extended validation, ca/browser forum, ssl certification authorities, certificate authority, ssl certificates, identity authentication
     VeriSign Incorp.
By: Splunk Inc.     Published Date: Jun 02, 2009
According to Forrester, organizations spent $1.5 trillion globally managing IT last year. 75% of this was spent on silos, legacy systems that still don't get answers to the most important questions: troubleshooting outages, investigating security incidents, and demonstrating compliance. Learn about the innovative software product forward-thinking organizations are using to dramatically improve their productivity and change the way they manage and secure IT.
Tags : it management, forrester, silos, legacy, data center, compliance, security, troubleshooting
     Splunk Inc.
By: Splunk Inc.     Published Date: Jun 02, 2009
Compliance is high on the IT agenda today, yet no one seems to have a clear picture of what it really involves. Inconsistent interpretation by different auditors, regulators and vendors means what worked in one year's audit could fail in the next. This whitepaper is designed to help Demystify Compliance as it relates to IT and give you some simple recipes for analyzing your own environment in the light of specific mandates.
Tags : compliance, splunk, it agenda, it security, regulations, proof-of-compliance, pci, hipaa
     Splunk Inc.
By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : software license, automate, reclaim licenses, compliance, improve, risk management
     IBM
By: GFI     Published Date: Sep 11, 2012
Mitsubishi Polysilicon turned to VIPRE Antivirus Business to replace a major brand-name anti-malware product that was causing too many headaches for its IT department and its 100-plus users.
Tags : malware, anti-virus, case study, security solutions, anti-malware, auditing, gfi software, security
     GFI
By: WidePoint     Published Date: Jan 22, 2014
Learn the 9 questions to ask in order to see how a telecom audit can dramatically reduce costs and recover money that was already paid to carriers.
Tags : widepoint, telecommunications, savings, telecom, telecom overhaul, mobility costs, mobile audit, mobility
     WidePoint
By: WidePoint     Published Date: Jan 23, 2014
Telecommunications services and pricing are a dynamic environment on both the carrier and the consumer, where carrier service offerings vary and evolve. However, assuring that contracts are enforced with the carrier and used properly by the consumer is a serious challenge that could be greatly effecting your organizations costs. Download this whitepaper to learn the 5 things a telecommunications audit can deliver, and how to maximize your results while greatly increasing your future savings and initial costs.
Tags : widepoint, audit, telecomm unications, telecommunications, telecommunications audit, mobility costs, mobile audit, mobility
     WidePoint
By: VMware AirWatch     Published Date: Sep 16, 2015
In this report, read about how AirWatch by VMware provides EMM suites to help organizations integrate mobile devices into their security framework, and provides tools for easier auditing and reporting, provisioning, support, data defense.
Tags : airwatch, security, data defense, mobile, emm, it management
     VMware AirWatch
By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. This rule significantly expands the definition of fiduciary, spanning financial advisors as well as plan sponsors, funds, and producers who provide incentives to advisors. The rule has far-reaching impacts on business, compliance, and operations/technology and the April 2017 compliance deadline is coming up quickly. View this on-demand webinar and learn how DocuSign can help you: • Satisfy the final rule requirements by automating disclosures with a tamper-proof audit trail • Delight clients and brokers by providing a greatly improved customer experience • Meet critical DOL deadlines with rapid implementation "
Tags : 
     DocuSign
By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. Many firms are in the early stages of assessing the rule’s impact, sorting through legal interpretations, and preparing for regulatory compliance. To understand who’s affected, what’s changed, and the impact to your business, read the white paper to learn how DocuSign can help you digitize your document agreements and: • Satisfy compliance requirements by enabling you to automate disclosures with a tamper-proof audit trail. • Delight your customers by providing a greatly improved user experience compared to paper-based document transactions. • Meet critical deadlines with rapid implementation using DocuSign’s SaaS-based solution."
Tags : 
     DocuSign
By: Qualys     Published Date: May 07, 2014
Learn how to easily pass an audit and see how you can better prepare the analyst in charge to be more productive by focusing time on analyzing the data and staying ahead of the audit curve.
Tags : qualys, it audit, it security, compliance, secure data, pass audit, prepare for audit, enterprise applications
     Qualys
By: ScriptLogic     Published Date: Nov 14, 2011
This whitepaper discusses the challenges of native tools and the 7 key capabilities that you need so that you can effectively audit Active Directory.
Tags : active directory, auditing, native tools, centralized, data, secure, database, compliance
     ScriptLogic
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.