IT Security Audits Reports

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

Keep Cloud Compliant
sponsored by TechTarget Security
EBOOK: Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

TechTarget Security

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
sponsored by IBM
EGUIDE: Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.
Posted: 03 Nov 2010 | Published: 25 Oct 2010

IBM

Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
sponsored by XTS
WHITE PAPER: This white paper provides an analytical perspective on how to best manage your Citrix environment.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

XTS

7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella

What to Look for in Secure Sockets Layer
sponsored by TechTarget Security
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

TechTarget Security

E-Guide: Database Tools for Auditing and Forensics
sponsored by TechTarget Security
EGUIDE: This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

TechTarget Security