auditor

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name

6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments

Published By: Alert Logic     Published Date: Oct 25, 2019
Meeting PCI Compliance in multi-cloud and hybrid cloud environments is challenging, but even more so is maintaining compliance on a day-to-day basis. When security compliance is managed manually, there are significant time and costs associated with doing so and it's difficult to demonstrate compliance to auditors and business partners. Read the eBook, 6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments to understand: • Inherent challenges in PCI DSS compliance across multi-cloud and hybrid cloud landscapes • The struggles companies face maintaining the tools and staff required to remain compliant • What to look for in solutions to address the complexities of meeting and maintaining compliance Find out how you can effectively attain and continuously meet PCI DSS Compliance in multi-cloud and hybrid environments.
Tags : 
    
Alert Logic

Gartner Report—How to Evaluate an ERP Vendor in Four Steps

Published By: Epicor     Published Date: Sep 20, 2017
Selecting the right enterprise resource planning (ERP) software often poses a challenge for many businesses in the manufacturing industry. With so many options out there, it’s difficult to break down each potential application and choose the one that’s the best fit for your business. This Gartner report explains how ERP selection teams can come to a consensus and establish an understanding of all options by jointly populating and prioritizing a hierarchical, weighted ERP evaluation model. A structured evaluation model helps put all the cards on the table by explaining and justifying to internal stakeholders, external auditors, and vendors how and why an ERP software decision was made. Read the Gartner report and establish your own ERP evaluation model to see if the Epicor ERP solution is the right fit for your manufacturing business.
Tags : 
    
Epicor

IT Policy Compliance for Dummies

Published By: Qualys     Published Date: Feb 22, 2010
This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization's IT operations to comply with laws and regulations - and how to prove compliance to an auditor.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard, anti spyware, application security, identity management, internet security, network security appliance, security policies, single sign on, web service security
    
Qualys

Reducing the Risk of Data Breaches on Your Most Critical Servers: How CA Can Help

Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies

Gestión de accesos con privilegios: una planificación para calcular el coste total de propiedad

Published By: CA Technologies EMEA     Published Date: Aug 24, 2017
Las cuentas de usuario con privilegios, ya se usurpen, sean objeto de abuso o, simplemente, se usen de forma incorrecta, se encuentran en el corazón de la mayoría de las infracciones relativas a datos. Los equipos de seguridad evalúan, cada vez más, soluciones de gestión de accesos con privilegios (PAM) completas para evitar el perjuicio que podría provocar un usuario malintencionado con privilegios altos o un usuario con privilegios que está cansado, estresado o que, sencillamente, comete un error. La presión que ejercen los ejecutivos y los equipos de auditoría para reducir la exposición de la empresa aseguran el esfuerzo, pero las soluciones de PAM completas pueden acarrear costes ocultos, según la estrategia de implementación adoptada.
Tags : 
almacen de contrasenas, monitorizacion de contrasenas, entornos hibridos
    
CA Technologies EMEA

Três maneiras de gerar reduções de custo em investigações de falso positivo

Published By: TIBCO Software     Published Date: Sep 16, 2019
A maior dor de cabeça para a maioria das equipes de operações de pagamento é o controle de custos - e grande parte disso vem do gerenciamento de fraudes: • As equipes de investigação perdem muito tempo apenas reunindo os dados necessários para tomar as decisões. • Os mecanismos de detecção estão sempre se atualizando com os mais recentes padrões de fraude. • Os regulamentos em constante mudança aumentam o tempo e o custo necessários para alcançar a conformidade e atender aos padrões de auditoria. Dado seu escopo e impacto, substituir os principais sistemas de fraude não é uma opção para a maioria das empresas. Mas, em vez de substituí-los, você pode melhorar o processo investigativo com uma investigação ampliada e aprimorar o processo de detecção aperfeiçoando os sistemas atuais. Este relatório descreve três maneiras pelas quais as empresas de serviços financeiros podem usar as soluções TIBCO para reduzir o custo das investigações por meio de uma melhor detecção, e simplificar a co
Tags : 
    
TIBCO Software

Tres maneras de impulsar la reducción de costos en investigaciones falsas positivas

Published By: TIBCO Software     Published Date: Sep 16, 2019
Para la mayoría de los equipos de operaciones de pago, el control de costos representa un gran dolor de cabeza -y en gran medida se origina del manejo de fraudes: • Los equipos de investigación dedican mucho tiempo solamente a reunir los datos necesarios para tomar decisiones. • Los motores de detección siempre están tratando de ponerse al día con los patrones de fraude más recientes. • Las regulaciones que cambian constantemente incrementan el tiempo y el costo necesarios para lograr el cumplimiento y cubrir los estándares de auditoría. Dado su alcance e impacto, reemplazar los sistemas de fraude centrales no es una opción para la mayoría de las empresas. Pero contrario a reemplazarlos, usted puede mejorar el proceso de investigación con la investigación aumentada, y mejorar el proceso de detección mediante el reforzamiento de los sistemas actuales. Este reporte describe tres formas en que las empresas de servicios financieros pueden utilizar las soluciones de TIBCO para reducir el
Tags : 
    
TIBCO Software

Prepare for Successful Audits: A Change Management Manager Checklist

Published By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor, change management, configuration management, solidcore, fortrex, security
    
Solidcore

Ensuring SOX Compliance via Enhanced Change Management

Published By: Solidcore     Published Date: Jan 15, 2008
Assure SOX compliance and address key questions asked by SOX auditors with simple change management enhancement.
Tags : 
auditing, compliance, change management, sarbanes oxley compliance
    
Solidcore

Who Accessed Your CEO’s Mailbox?

Published By: Netwrix     Published Date: Oct 01, 2013
Who Accessed Your CEO’s Mailbox? Netwrix Free Trial
Tags : 
netwrix, free trial, financial data, sox, glba and hipaa, auditing, netwrix auditor, security
    
Netwrix

Auditing for PCI Compliance using Riverbed SteelCentral Netauditor

Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelCentral™ NetAuditor plays an important role in ensuring compliance with the PCI security standards. This document explains the part played by each of the SteelCentral NetAuditor solutions.
Tags : 
pci compliance, auditing, data security, cardholder data, security standards, security measures, security, data management, data center
    
Riverbed

Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager

Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor, mcafee risk & compliance, security, it management, data management, business technology, data center
    
McAfee

Read the 2012 Evalueserve Risk and Compliance Report

Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor, mcafee enterprise security manager, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, compliance, identity management, internet security, intrusion detection
    
McAfee

Strong Security with Lower Operational Costs and Simplified Compliance

Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci, anti spam, anti spyware, anti virus, application security, auditing, compliance
    
McAfee

Cost-Effective Database Protection to Meet Your Compliance Requirements

Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware, anti virus, application security, business continuity, compliance, disaster recovery, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, vulnerability management, data loss prevention
    
McAfee

Learn the Secrets to Accelerating Your Year-End Close

Published By: Prophix     Published Date: Apr 24, 2013
Discover how leading organizations leverage performance management software to obtain commitment from senior management, forge effective partnerships with auditors, and monitor progress throughout the year.
Tags : 
roi, closing, efficiency, analytics, accounting, finance, budgeting, data, application integration, application performance management, best practices, business activity monitoring, business analytics, business integration, business intelligence, business metrics, business process management, enterprise resource planning, enterprise software, project management
    
Prophix

How to disappoint your HIPAA auditors and gain the respect of your board of directors

Published By: DataMotion     Published Date: Oct 01, 2008
With HIPAA audits now randomized, you must be prepared for them every day. And with state regulations requiring compliance-breach reporting, you must become your own auditor. HIPAA is the Health Insurance Portability and Accountability Act, the 1996 federal regulation that mandated health-data privacy.This regulation requires compliance by all insurers and health care providers, including physician’s offices, hospitals, health plans, employers, public health authorities, life insurers, clearinghouses, billing agencies, information systems vendors, service organizations, and universities.But that’s not all.
Tags : 
certifiedmail technology, act's privacy rule, health insurance portability, accountability act, security, it management, data management, firewalls
    
DataMotion

PCI X-Ray: File Integrity Monitoring (Forrester)

Published By: NetIQ     Published Date: Dec 23, 2010
To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. This document deals with file integrity monitoring (FIM) for PCI, while providing practical technical guidance to help ensure PCI Compliance before your auditor shows up to develop the ROC.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, auditing, compliance
    
NetIQ

Software Asset Management (SAM):Benefits Beyond the Software Audit

Published By: LANDesk     Published Date: Feb 08, 2010
At the time of a software audit, a SAM program helps you avoid increased license fees and penalties and keeps your employees engaged in your key initiatives rather than burdened by an auditor's requests for documentation.
Tags : 
avocent, sam, software asset management, gartner, audit, license fee, register, license key, enterprise resource planning, enterprise software, system management software, workforce management
    
LANDesk

Principles for Improving Internal Audit’s Value Proposition

Published By: ARMA     Published Date: Nov 04, 2014
All organizations depend on information to manage day-to-day operations, comply with regulations, gauge financial performance, and monitor strategic initiatives. This critical information resides in the organization's business records. As internal auditors conduct their annual risk assessment, they should consider how well business records are managed and assess the degree to which the risks to this information are understood.
Tags : 
value proposition, financial performance, internal auditors, annual risk assessment, it management, knowledge management, best practices, business intelligence, business management
    
ARMA

Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform

Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies, enterprise applications, enterprise integration, vulnerability scanners, threat management, security platforms, cloud, network security, application security, application integration, data protection, database security, cloud computing
    
Qualys

Access Management: Efficiency, Confidence and Control

Published By: SAP     Published Date: Feb 11, 2011
Read this Aberdeen Group research report, "Access Management: Efficiency, Confidence and Control" and learn how top performers protect access to information assets at lower cost while staying on top of compliance.
Tags : 
sap, access management, efficiency, confidence, control, auditors, access control, information management
    
SAP

Eight Elements of Effective Information Security Policies

Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, knowledge management, identity management, hipaa compliance, information management
    
Information Shield

3 Ways to Improve Internal Audit Performance

Published By: AuditBoard     Published Date: Nov 26, 2018
AuditBoard’s OpsAudit platform is the only-purpose built audit technology, built for auditors, by auditors. Whereas other solutions in the GRC market are a “mile wide and an inch deep,” AuditBoard’s OpsAudit encompasses and streamlines all of the nuances associated with carrying out a world-class internal audit department. AuditBoard’s ease of use allows for auditors to spend all of their time with their audit customers and on their audit work, without suffering through administrative tasks or technology problems.
Tags : 
    
AuditBoard

Focus on IPE Best Practices

Published By: AuditBoard     Published Date: Nov 26, 2018
You are the CAE of a mature company sitting with your external auditor, ready to kick off planning for the upcoming year. You’ve always been on top of your controls environment, and expect this upcoming year to go smoothly. However, mid-way through discussing your new areas of focus, the conversation goes astray as your auditor starts throwing out terms like “IPE” or “Electronic Audit Evidence” and says a whole new set of evaluation points will have to occur for every control test in your environment.
Tags : 
    
AuditBoard
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.