Auditing (Computer Security) White Papers

(View All Report Types)
Enabling Continuous Compliance Across the Enterprise
sponsored by IBM
WHITE PAPER: Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

Proactive data security, audit and compliance solutions
sponsored by IBM
WHITE PAPER: Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
Posted: 16 Oct 2013 | Published: 30 Apr 2013

IBM

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.

The Event Data Warehouse- Strategies for Improving Business Performance
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions.
Posted: 18 Jul 2011 | Published: 18 Jul 2011

Hexis Cyber Solutions Inc

Manage Risk and Address Return on Investment with IBM Compliance Solutions
sponsored by IBM Software Group
WHITE PAPER: Governance, risk management and compliance place high expectations on IT to establish, enforce and prove the efficacy of policies, processes and controls.
Posted: 15 Feb 2008 | Published: 01 Mar 2007

IBM Software Group

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

All Qualified Security Assessors Are Not Created Equal
sponsored by AT&T Corp
WHITE PAPER: The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment
Posted: 04 Aug 2010 | Published: 04 Aug 2010

AT&T Corp