Auditing White Papers

An Information Technology (IT) audit or information systems (IS) audit is an examination of the controls within an entity's Information technology infrastructure. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.
Results 1 - 25 of 170Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Unfortunately most large organizations aren't ready for this brave new world of digital content distribution remaining woefully unsearchable while languishing behind departmental silos. This whitepaper explores how your organization can leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: SilverSky     Published Date: Apr 16, 2013

In Forrester's 15-criteria evaluation of the emerging managed security services provider (MSSP) market, SilverSky was identified as a leader. Forrester identified the 10 most significant providers in this category and researched, analyzed, and scored them. SilverSky was given high ranks for business and technical value, SLA adherence, security services, and threat intelligence and analytics. Download this industry research paper now to learn why SilverSky is the MSSP you should be working with today.

Tags : managed security, msp, managed service provider, sla adherance, threat intelligence, analytics, mssp, forrester
    
By: SilverSky     Published Date: Apr 16, 2013

Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.

Tags : vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus
    
By: Kaseya     Published Date: Apr 04, 2013

A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.

Tags : it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus
    
By: Symantec     Published Date: Apr 04, 2013

This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.

Tags : malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
    
By: Symantec     Published Date: Apr 04, 2013

How Code Signing Can Bolster Security for Mobile Applications

Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
By: Symantec     Published Date: Apr 04, 2013

Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?

Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security, access control
    
By: Symantec     Published Date: Apr 04, 2013

In this business guide, we discuss how the latest code signing technology works to secure software code and content for applications that are directly downloaded to mobile devices from the Internet.

Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
By: SilverSky     Published Date: Mar 20, 2013

In this whitepaper, we highlight the important issues surrounding cloud email, such as cost, security, monitoring, uptime, and compliance.

Tags : email, cloud, uptime, compliance, data protection, security, email security, business continuity
    
By: McAfee     Published Date: Mar 11, 2013

McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: McAfee     Published Date: Mar 08, 2013

McAfee Virtual Patching for Databases makes perfect sense for closing the window of risk, while saving dollars and minimizing business disruption.

Tags : database security, database patching, database compliance, database security patches, virtual patching, hipaa, pci dss, anti spyware
    
By: McAfee     Published Date: Mar 08, 2013

McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.

Tags : database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting, anti spyware
    
By: McAfee     Published Date: Mar 08, 2013

Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.

Tags : database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley
    
By: McAfee     Published Date: Mar 08, 2013

McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: McAfee     Published Date: Mar 08, 2013

McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.

Tags : database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection, access control
    
By: McAfee     Published Date: Mar 08, 2013

McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.

Tags : database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
By: McAfee     Published Date: Mar 07, 2013

McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.

Tags : securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba
    
By: McAfee     Published Date: Mar 07, 2013

HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.

Tags : best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases, anti spam
    
By: McAfee     Published Date: Mar 07, 2013

McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: Bit9     Published Date: Mar 07, 2013

Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.

Tags : security, risk management, roi, cost reduction, enterprise, cyber threat, anti spam, anti spyware
    
By: Bit9     Published Date: Mar 07, 2013

In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.

Tags : data breaches, data center, security, cyber threats, server, business continuity, access control, anti spam
    
By: Tripwire     Published Date: Feb 08, 2013

Continuous monitoring is not a single solution—it’s a best practice for IT security.

Tags : automation, continuous monitoring, security, threat detection, threat prevention, hacker, malware, cyber attack
    
By: Tripwire     Published Date: Feb 08, 2013

It’s no small feat to balance access to data to meet business goals with protecting that very same data from hackers.

Tags : high availability, cloud, security, hacker detection, intrusion prevention, anti spam, anti spyware, anti virus
    
Start   Previous   1 2 3 4 5 6 7    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.