file integrity monitoring

Results 1 - 16 of 16Sort Results By: Published Date | Title | Company Name
By: NetIQ     Published Date: Nov 01, 2012
This paper discusses the importance of file integrity monitoring, which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches.
Tags : data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance, security
     NetIQ
By: NetIQ     Published Date: Dec 23, 2010
To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. This document deals with file integrity monitoring (FIM) for PCI, while providing practical technical guidance to help ensure PCI Compliance before your auditor shows up to develop the ROC.
Tags : netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, auditing, compliance
     NetIQ
By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection, compliance, intrusion detection, data protection
     NetIQ
By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management, security management, configuration management
     Tripwire, Inc
By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti virus, application security, security management, security policies, application performance management, best practices, business activity monitoring, vulnerability management
     Lumension
By: Lumension     Published Date: Jan 22, 2013
You just can’t cut corners today. In fact you need to be very careful about even “optimizing” your security efforts because it’s so easy to misjudge what needs to be secured and what doesn’t; what deserves your attention and what doesn’t.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spyware, anti virus, application security, auditing, business continuity, encryption, hacker detection, best practices
     Lumension
By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies
     Lumension
By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks, malware, servers, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, email security, encryption, firewalls
     Lumension
By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile, byod, windows rt, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, email security, encryption, firewalls
     Lumension
By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition, access control, auditing, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, password management, vulnerability management
     NetIQ
By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc, audit, regulatory compliance, access control, compliance, internet security, intrusion detection, intrusion prevention, vulnerability management
     NetIQ
By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
     Tripwire
By: Tripwire     Published Date: Dec 16, 2009
Read this white paper to find out the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.
Tags : tripwire, file integrity monitor, compliance, security, configuration assessment, configuration control, virtual and physical infrastructure, security management, configuration management
     Tripwire
By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam, anti spyware, anti virus, application security, business continuity, encryption, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, network security appliance
     Lumension
By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : netiq, nrg, nrg energy, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition, access control, application security, authentication, internet security, intrusion detection, intrusion prevention, policy based management, security management
     NetIQ
By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security
     NETIQ
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.