Audit Trail Reports

Computer Weekly – 25 August 2020: When algorithms don't play fair
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Aug 2020

TechTarget ComputerWeekly.com

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Step by Step: Best practices for security patch management
sponsored by TechTarget Security
EGUIDE: Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
Posted: 03 Mar 2011 | Published: 03 Mar 2011

TechTarget Security

Strategies to Survive Software Asset Management Audits
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

Role Based Access Control and Entitlement Management
sponsored by FoxT
PRESENTATION TRANSCRIPT: The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.
Posted: 30 Sep 2009 | Published: 30 Sep 2009

FoxT

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by Globalscape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

Globalscape

Audit Tracking & SOX Compliance
sponsored by RevSoft
WHITE PAPER: Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

Securing Virtualized Data Centers
sponsored by Trend Micro, Inc.
EBOOK: On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Trend Micro, Inc.

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software