(Translated by https://www.hiragana.jp/)
Auditing White Papers - Business Exchange
The Wayback Machine - https://web.archive.org/web/20110913184635/http://whitepapers.bx.businessweek.com/technology/security/auditing

Auditing

An Information Technology (IT) audit or information systems (IS) audit is an examination of the controls within an entity's Information technology infrastructure. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.
Results 1 - 25 of 396Sort Results By: Published Date | Title | Company Name
By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security
     Trend Micro Inc.
By: Fortify, An HP Company     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
     Fortify, An HP Company
By: Trend Micro Inc.     Published Date: Aug 23, 2011
Cybercriminals are constantly moving in with new methods of attack - here's how to stem the rising tide.
Tags : trend micro, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business
     Trend Micro Inc.
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This solution brief introduces the Smart Archive strategy from IBM, which is a comprehensive approach that combines IBM software, systems and service capabilities to help you drive down costs down and help ensure critical content is properly retained and protected.
Tags : ibm uk, ibm smart archive, ibm smart archive strategy, hardware, software, services, optimize, unify content
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG Lab report presents the results of a mixed workload performance benchmark test designed to assess the real world performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers in a VMware-enabled virtual server environment.
Tags : esg, virtualization, ibm, storwize v7000, storage, management, consolidation, virtualization
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Browse this summary for additional information about performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers.
Tags : ibm uk, ibm, storwize v7000, storage, management, consolidation, virtualization, tiering
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This whitepaper explores the latest challenges and innovations in data protection and retention.
Tags : ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r;
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG whitepaper reviews challenges introduced by data growth and focuses on IBM data protection and retention products/technologies that address storage efficiency.
Tags : ibm uk, esg, data growth, data protection, information systems, information management, business continuity, business resiliency
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Take a look at this flier for additional information regarding archiving and retention solutions from IBM.
Tags : ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r;
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG Lab report examines an innovative high speed data compression appliance from IBM.
Tags : ibm uk, real-time compression, compression, nas, storage efficiency, deduplication, netapp, n series
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Read how Real-time Compression can impact your environment in the ESG Lab Validation Report.
Tags : ibm uk, real-time compression, compression, nas, storage efficiency, deduplication, netapp, n series
     Ogilvy - IBM UK
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Intacct Corporation     Published Date: Jan 26, 2011
In this short demo, see the Intacct accounting software functionality that's specifically catered to the needs of Software, SaaS, Cloud and Appliance companies like yours.
Tags : intacct demo, cloud accounting software, software companies demo, saas, cloud, appliance, financial consolidation, reporting
     Intacct Corporation
By: Intacct Corporation     Published Date: Jan 03, 2011
By embracing new-breed financial software solutions, organizations of all sizes are achieving and enjoying the unprecedented flexibility of anytime/anywhere instant-access to financial data, reports, transactions, and analysis.
Tags : intacct corporation, accounting and financial software, roi, auditing
     Intacct Corporation
By: ScriptLogic     Published Date: Aug 30, 2010
Managing the security and uptime of a Windows network requires you to master your Active Directory, the brain and heart of the network, with maximum efficiency. Active Administrator makes it simpler and faster than native Windows tools to exceed compliance regulations, tighten security, increase productivity, and improve business continuity.
Tags : scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore
     ScriptLogic
By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
     Absolute Software
By: Dell Secureworks     Published Date: Sep 04, 2011
This paper will discuss the benefits of threat intelligence for both the enterprise and individual security professionals.
Tags : 
     Dell Secureworks
By: Osterman Research, Inc.     Published Date: Aug 16, 2011
Read this white paper to learn more about the risks, rewards, and potential pitfalls of social networking.
Tags : osterman research, social media, commvault, mcafee, live event, web 2.0 security, policies, archiving
     Osterman Research, Inc.
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
     DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
     DigitalPersona UK
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

ADD WHITE PAPERS

Get your company's white paper reports in the hands of targeted business professionals.

Search Cancel