auditor

Results 26 - 36 of 36Sort Results By: Published Date | Title | Company Name
Published By: Quest Software     Published Date: Oct 02, 2012
Uh-oh - you're facing an IT audit, but you can't just drop your normal responsibilities to prepare for it. In this Quest white paper, learn five key tips for handling auditors.
Tags : 
audit, auditor, best practices, quest
    
Quest Software
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation
    
IBM
Published By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how delegating administrative privileges can aid in improving administrative productivity, system availability and security, while satisfying the demands of auditors.  Read this new white paper from NetIQ today.
Tags : 
access control, security, audit, auditor, auditing, change management, net iq, netiq
    
NetIQ Corporation
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : 
netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing, systems monitoring
    
Netwrix
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Published By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : 
security, data security, file share security, sharepoint, file servers, netapp
    
Quest Software
Published By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: IBM     Published Date: Jul 14, 2016
How are some companies decreasing audit fees in the face of pressure to increase them? In this follow-up report to the 2015 Audit Fee Survey, Financial Executives Research Foundation interviewed several senior-level financial executives and audit partners. These interviews revealed best practices in mitigating increases in audit fees and how to work more efficiently and effectively with auditors. Access this report to learn the reasons for increased audit fees and the impact of PCAOB inspections. You'll also discover how to review current audit focus areas, improve internal controls, automate processes, and review audit hours and fees.
Tags : 
best practices, audit, finance, efficiency, productivity
    
IBM
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Durante los últimos años, la gestión de accesos con privilegios (un conjunto de funciones de control, monitorización y auditoría cuyo fin es mitigar los riesgos asociados a los usuarios, las cuentas y las credenciales con privilegios) se ha convertido en una de las principales prioridades para cualquier tipo de organización.
Tags : 
prevención de fugas de datos, gestión de las amenazas internas, auditoría y conformidad con normativas, infraestructura de ti híbrida
    
CA Technologies EMEA
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.