Share us:
 

Auditing

An Information Technology (IT) audit or information systems (IS) audit is an examination of the controls within an entity's Information technology infrastructure. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.
Results 26 - 50 of 172Sort Results By: Published Date | Title | Company Name
Webinar Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Learn how McAfee Deep Defender version 1.0 targets the more dangerous kernel mode rootkits.
Tags : 
rootkit, deep defender, application control, change control, black listing
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.
Tags : 
security management platform, siem, log management, security management 2.0, anti spam
    
McAfee
Case Study Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies.
Tags : 
big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti
    
McAfee
Free Offer Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring
    
McAfee
White Paper Published By: Symantec     Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.
Tags : 
endpoint protection, security, performance test, comparison, windows 8
    
Symantec
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : 
security, network security, enterprise, infrastructure, best practices
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : 
security, compliance, mobile, tablets, byod
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.
Tags : 
cloud, security, attacks, risk, virtualization
    
HP - Enterprise
Webinar Published By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
You just can’t cut corners today. In fact you need to be very careful about even “optimizing” your security efforts because it’s so easy to misjudge what needs to be secured and what doesn’t; what deserves your attention and what doesn’t.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.
Tags : 
best practices, devices control, encryption, security, business continuity
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : 
security, network security, cyber attacks, access control, anti spam
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 18, 2013
HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet industry best practices?
Tags : 
hipaaa, hitech act, compliance, cyber liability, healthcare data
    
Lumension
Webinar Published By: Oracle Corp.     Published Date: Oct 15, 2012
Hear from Tammy Bednar, Senior Principal Product Manager at Oracle as she discusses best practices for database auditing, alerting and reporting across Oracle and non-Oracle databases using Oracle Audit Vault.
Tags : 
database auditing, audits, compliance, database, oracle
    
Oracle Corp.
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service