compliance auditing

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name
Published By: Workday Nordics     Published Date: Sep 19, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
workday, workday technology, digital strategy, financial auditing
    
Workday Nordics
Published By: Red Hat     Published Date: Sep 25, 2014
As a strategic partner in your business, you face increasing demands from your line-of-business leaders for new functionality and advanced capabilities, which you must deliver with a constrained IT budget. What could you do to meet these expectations and add value to the business if you could contain costs, increase operational efficiency, and do more with less? You need to overcome several challenges. The cost of software licensing management is rising as a result of maintaining proprietary platforms or legacy technology, making it difficult to modernize your datacenter and migrate to more cost-effective solutions. You’re likely burdened by regulatory compliance mandates, which create enforcement, reporting, and auditing expenses. And, like 67% of IT organizations, your budget is probably shrinking. Red Hat can help. Red Hat® Enterprise Linux® gives you the high-value subscription model, built-in governance processes, and simplified migration path you need to aggressively lower your
Tags : 
increased demands, functionality, software licensing management, proprietary platforms, legacy technology, datacenter, it organization, it management, data management
    
Red Hat
Published By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Epicor     Published Date: Apr 01, 2009
This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.
Tags : 
epicor, grc, governance risk and compliance, supply chain visibility, erp solutions, expense management, data auditing, it management
    
Epicor
Published By: Solidcore     Published Date: Jan 07, 2008
This paper lays out the challenges with complying with SOX and suggests a radical solution: build a self-service, automated IT control framework in which all the information required to verify compliance is available in a single reporting system.
Tags : 
compliance, sox, sox compliance, sarbox, sarbox compliance, audit, self audit, self auditing, change management, it controls, solidcore
    
Solidcore
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, sox, sarbanes-oxley, hipaa, glba, pci, cross-platform, auditing, logging, security, rbac, entitlements, privilege management
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
    
Centrify Corporation
Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelCentral™ NetAuditor plays an important role in ensuring compliance with the PCI security standards. This document explains the part played by each of the SteelCentral NetAuditor solutions.
Tags : 
pci compliance, auditing, data security, cardholder data, security standards, security measures, data management, data center
    
Riverbed
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley, hipaa, hitech, ssae
    
McAfee
Published By: NetIQ     Published Date: Dec 23, 2010
This white paper describes three significant issues with Group Policy change management using native tools and describes a solution for applying best practices for change management.
Tags : 
netiq, change management, microsoft group policy, compliance auditing, recovery
    
NetIQ
Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox, sarbox, sarbanes oxley, sarbanes-oxley, pci, pci-dss, pci dss, compliance, auditing, audit, security audit, axeda
    
Axeda Corporation
Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci, pc ftp application, script file exposure, file encryption processes
    
Linoma Software
Published By: IBM Corporation     Published Date: Jun 30, 2011
IBM Tivoli Application Dependency Discovery Manager supports the alignment of IT and business with robust and automated application mapping and discovery that helps organizations understand the impact of change and meet compliance needs with detailed reporting and auditing.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, power and cost savings, energy optimization
    
IBM Corporation
Published By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment, qualified third parties, qualifications, risk mitigation, monitoring and auditing
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 04, 2014
Review the past year and identify key trends with an eye towards planning for the year ahead with the recommendations of this research whitepaper.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment, qualified third parties, qualifications, risk mitigation, monitoring and auditing
    
NAVEX Global
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management
    
Centrify Corporation
Published By: Tripwire     Published Date: Aug 21, 2009
This paper covers the implementation, disclosure and ongoing evaluation of internal controls for SOX compliance with a focus on the role of IT, as well as the penalties for non-compliance.
Tags : 
sarbane oxly act, sarbanes oxley, sox, sarbox, sarbanes-oxley, financial, it management, audit, compliance, auditing, enron, tripwire, data management
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : 
tripwire, information security, infrastructure, change management, change, change auditing
    
Tripwire
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Quest Software     Published Date: Oct 02, 2012
Your business relies on Active Directory, so you must regularly audit and monitor it to meet security and compliance requirements. But native auditing tools can't do the job alone.
Tags : 
audit, quest, compliance, security, auditing tools, compliance requirements, active directory, business technology
    
Quest Software
Published By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed
    
Business Software
Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance, auditing, security audit, audit, sox audit, data protection, storage management, bocada, bocata
    
Bocada
Published By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : 
compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management, vulnerability assessment, vulnerability, preventsys
    
Preventsys
Previous   1 2    Next    
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.