CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

auditing

Results 26 - 50 of 135Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Apr 24, 2015
A brief on how to use network auditing and configuration with the maximum of efficiency and utility.
Tags : 
networking, api, applications, management, visualizing, best practices, monitoring, auditing
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
In the world of network management, knowledge is power. But many organizations know a lot less about their network than they think. With proper network auditing and configuration, businesses can fill this knowledge gap.
Tags : 
network management, network auditing, automation, key network management processes, audit, network infrastructure, network performance, infrastructure
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelCentral™ NetAuditor plays an important role in ensuring compliance with the PCI security standards. This document explains the part played by each of the SteelCentral NetAuditor solutions.
Tags : 
pci compliance, auditing, data security, cardholder data, security standards, security measures, security, data management
    
Riverbed
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation
Published By: Red Hat     Published Date: Sep 25, 2014
As a strategic partner in your business, you face increasing demands from your line-of-business leaders for new functionality and advanced capabilities, which you must deliver with a constrained IT budget. What could you do to meet these expectations and add value to the business if you could contain costs, increase operational efficiency, and do more with less? You need to overcome several challenges. The cost of software licensing management is rising as a result of maintaining proprietary platforms or legacy technology, making it difficult to modernize your datacenter and migrate to more cost-effective solutions. You’re likely burdened by regulatory compliance mandates, which create enforcement, reporting, and auditing expenses. And, like 67% of IT organizations, your budget is probably shrinking. Red Hat can help. Red Hat® Enterprise Linux® gives you the high-value subscription model, built-in governance processes, and simplified migration path you need to aggressively lower your
Tags : 
increased demands, functionality, software licensing management, proprietary platforms, legacy technology, datacenter, it organization, it management
    
Red Hat
Published By: Globalscape     Published Date: Jun 27, 2014
Globalscape’s Enhanced File Transfer™ (EFT™) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper discusses how EFT, the HSM, and ARM can help you achieve compliance and stay compliant with the PCI DSS.
Tags : 
globalscape, enhanced file transfer, high security module, auditing, reporting, security practices, compliance, file transfer
    
Globalscape
Published By: Intacct Corporation     Published Date: Jun 18, 2014
In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!
Tags : 
intacct corporation, accounting and financial software, roi, auditing, networking, software development, it management, business technology
    
Intacct Corporation
Published By: Intacct     Published Date: Apr 28, 2014
Download to learn about auditing best practices and how to avoid common pitfalls.
Tags : 
audit, cloud accounting software, gaap, external audits, audit preparation, cloud technology, financials, finance
    
Intacct
Published By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 04, 2014
Review the past year and identify key trends with an eye towards planning for the year ahead with the recommendations of this research whitepaper.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
    
NAVEX Global
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications
    
Intralinks
Published By: Netwrix     Published Date: Oct 01, 2013
Who Accessed Your CEO’s Mailbox? Netwrix Free Trial
Tags : 
netwrix, free trial, financial data, sox, glba and hipaa, auditing, netwrix auditor, security
    
Netwrix
Published By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : 
netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing
    
Netwrix
Published By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : 
it governance, risk, compliance, servicenow, webinar, software development, it management, knowledge management
    
ServiceNow
Published By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed, finance
    
Business Software
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.
Tags : 
securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba
    
McAfee
Published By: McAfee     Published Date: Nov 14, 2012
Real-Time Database Monitoring, Auditing, and Intrusion Prevention Databases store an enterprise's most valuable information assets, but in most organizations they are poorly protected. It's common sense to secure databases, but it's not that simple.
Tags : 
database monitoring, auditing, intrusion prevention, database, mcafee, hacker detection, intrusion detection, java
    
McAfee
Published By: IBM     Published Date: Nov 09, 2012
Many organizations today are introducing additional controls and accountability into management practices to improve governance and mitigate against risk. Read this white paper to learn more about Information governance and auditing with System Z.
Tags : 
ibm, system z, information governance audit, protection, data protection, business technology
    
IBM
Published By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : 
security, data security, file share security, sharepoint, file servers, netapp, data management, data center
    
Quest Software
Published By: Splunk     Published Date: Oct 15, 2012
Real-time Monitoring and Auditing for Microsoft Windows Server Active Directory
Tags : 
splunk, windows server, it infrastructure, servers, enterprise applications, data management, business technology, infrastructure
    
Splunk
Published By: Oracle Corp.     Published Date: Oct 15, 2012
Hear from Tammy Bednar, Senior Principal Product Manager at Oracle as she discusses best practices for database auditing, alerting and reporting across Oracle and non-Oracle databases using Oracle Audit Vault.
Tags : 
database auditing, audits, compliance, database, oracle, database security, auditing
    
Oracle Corp.
Published By: Quest Software     Published Date: Oct 02, 2012
Your business relies on Active Directory, so you must regularly audit and monitor it to meet security and compliance requirements. But native auditing tools can't do the job alone.
Tags : 
audit, quest, compliance, security, auditing tools, compliance requirements, active directory, business technology
    
Quest Software
Published By: Dell Software     Published Date: Oct 01, 2012
Finding what you need in Active Directory’s native audit log can be an awful manual-intensive nightmare. There is a better, automated way to help you take control of AD auditing. Read this paper to learn seven essential audit needs, and how Active Administrator meets them.
Tags : 
active directory, auditing, dell software, audit log, ad auditing
    
Dell Software
Start   Previous    1 2 3 4 5 6    Next    End
Search