Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

security audit

Results 1 - 25 of 157Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
Is your file transfer infrastructure equipped to meet today’s business demands? Read four keys you can apply to dramatically improve the security, auditability, service delivery, and scalability of your file transfer operations in order to deliver exceptional customer experiences. You’ll learn why it’s critical to: • Make data visible where it is in the network • Reduce or eliminate ad hoc use of FTP • Build scalability into your file transfer system • Monitor data transfers from beginning to end
Tags : 
    
Group M_IBM Q4'19
Published By: Alert Logic     Published Date: Oct 25, 2019
Meeting PCI Compliance in multi-cloud and hybrid cloud environments is challenging, but even more so is maintaining compliance on a day-to-day basis. When security compliance is managed manually, there are significant time and costs associated with doing so and it's difficult to demonstrate compliance to auditors and business partners. Read the eBook, 6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments to understand: • Inherent challenges in PCI DSS compliance across multi-cloud and hybrid cloud landscapes • The struggles companies face maintaining the tools and staff required to remain compliant • What to look for in solutions to address the complexities of meeting and maintaining compliance Find out how you can effectively attain and continuously meet PCI DSS Compliance in multi-cloud and hybrid environments.
Tags : 
    
Alert Logic
Published By: AWS     Published Date: Oct 01, 2019
Trying to keep up with the growing number of instances and containers, Informatica would spin up new security policies with shared key access. This led to a sprawling, complex network of multiple security interfaces that were difficult to manage. Informatica began working with Aporeto to track, block, and audit users through their environment, and eventually implemented keyless SSH access to their Amazon Elastic Compute Cloud (Amazon EC2) instances. Read our case study to learn how Aporeto saved Informatica hundreds of development hours with automated authentication and authorization policies across their environment.
Tags : 
    
AWS
Published By: NetSpi     Published Date: Oct 01, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify any misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
    
NetSpi
Published By: NetSpi     Published Date: Sep 20, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify and misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
    
NetSpi
Published By: Lenovo - APAC     Published Date: Aug 13, 2019
How much money does the average data breach cost? How many days of downtime does ransomware cause? How many millions of people have their data exposed? Discover the vast impact on time, money & productivity of security breaches. Investing up front in strong security, will save you in the long run. Comprehensive end-to-end security not only reduces the risk of being compromised, it also brings benefit to the business., Taking steps to invest in the right solutions, that use rigorous, trackable and auditable security standards, across their entire supply chain is a must to mitigate risks. ThinkShield provides that and so much more. It is a security solution that offers end-to-end protection that drives productivity, innovation, and profitability.
Tags : 
    
Lenovo - APAC
Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic
Published By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
    
Flexera
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: Key Private Bank     Published Date: May 22, 2018
There are obviously a variety of choices open to you: a spreadsheet plug-in may be appropriate if you are only focused on general ledger reporting and do not have concerns over security or compliance. You might also suppose that this is a low-cost option, though we would argue that the remediation required, the additional audit fees and the lack of repeatability means that this is a false economy and that this approach will end up costing you more in the long term. A second use case would be where you already have a financial reporting solution installed, when the add-on facilities for purposes such as business intelligence are likely to be your major focus. In this case an Oracle based solution is likely to be as good as anything else.
Tags : 
finance, business, planning, integration, strategy, company
    
Key Private Bank
Published By: Insight Software     Published Date: May 22, 2018
There are obviously a variety of choices open to you: a spreadsheet plug-in may be appropriate if you are only focused on general ledger reporting and do not have concerns over security or compliance. You might also suppose that this is a low-cost option, though we would argue that the remediation required, the additional audit fees and the lack of repeat-ability means that this is a false economy and that this approach will end up costing you more in the long term. A second use case would be where you already have a financial reporting solution installed, when the add-on facilities for purposes such as business intelligence are likely to be your major focus. In this case an Oracle-based solution is likely to be as good as anything else.
Tags : 
financial, business, reporting, oracle, compliance, security
    
Insight Software
Published By: Cybric     Published Date: Oct 30, 2017
How a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Whether you’ve over-invested in security tools, under-invested, don’t know the extent of your security capabilities or you’re facing new regulations that require you to demonstrate and continually maintain compliance — there is a path forward. To understand and optimize what you have in place, as well as gaps you may have, develop a security rationalization process to calculate the return on your security investments. Read this paper to learn the five steps needed to get started.
Tags : 
cybersecurity, cyber security, ciso, security visibility, security assurance, security resilience, application security tools, appsec, security audit
    
Cybric
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: Qualys     Published Date: Jan 11, 2017
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
With attackers getting more sophisticated every day, manual methods of locating and testing web-based apps are no longer enough. The right Web Application Scanning (WAS) solution can help you systematically: discover web apps running in your network, determine whether or not they are vulnerable to attack, understand how to fix them, and protect your business while fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.