Category Archives: Audit

IT GRC Turning Operational Risks into Returns

Learn how to turn your company’s IT GRC processes into strategic assets. Recent financial upheavals have resulted in a wave of increased regulations, and organizations are facing increasingly stringent government scrutiny and audit requirements. As a result, companies across the spectrum must implement an effective IT Governance, Risk and Compliance […]

Read More

Ensuring PCI Compliance with Identity and Access Management

Learn from an industry expert how to comply with the Payment Card Industry Data Security Standard (PCI DSS) and protect consumers’ data. View this informative on-demand webinar featuring Courion customer Sundiata Alaye of SiriusXM Radio and industry expert Davi Ottenheimer as they discuss how organizations must demonstrate compliance with the […]

Read More

IDC Spotlight: Access Control and Certification

Read this brief for best practices on managing user access compliance. Ensuring user access is compliant with policy and regulatory requirements is critical to managing IT security and demonstrating audit compliance. This brief by IDC discusses best practices and solutions for addressing these challenges. Courion Corporation Please fill the below […]

Read More

Spazio File Audit & Control: Definition & Benefits

Learn how senior managers and executives are exploring ways to reducing complexity of their IT system and are reducing cost and operation expense. Key points of the paper:Discusses the business problems faced by companies moving files through their infrastructure and to third parties outside the company. Often these transfers have […]

Read More

Achieving Enormous Efficiencies in Policy and Compliance Management

Learn how The First American Corporation centralizes their approach to policy and compliance management with Archer Technologies solutions. For many years, The First American Corporation used a variety of applications, spreadsheets and documents to manage policy and compliance processes across their five major business segments. While their processes were effective, […]

Read More

Choosing the Right Email Archiving Solution for your Enterprise

Address email problems with full mailboxes, lost backup tapes, IT audits, records requests, and employee turnover. This white paper will help Executive Management discover the various reasons to archive email and provides guidance about how to select an appropriate archiving system. The paper covers software, SaaS and appliance solutions and […]

Read More

Scalability in Log Management

Are you aware of the drivers for log management scalability and the resulting requirements that should be considered in any log management evaluation? In the last few years, log management has become increasingly relevant to multiple groups within any organization. Audit teams leverage logs to automate compliance reporting and detect […]

Read More

SANS Analyst Review – Log Management

SANS Analyst Review of Log Management, highlighting ArcSight Logger, by analyst Jerry Shenk. This white paper provides a requirements checklist for those considering options and features for their log management systems. Over the past four years, the SANS Annual Log Management Survey has shown increased interest in log management as […]

Read More

NERC CyberSecurity Solutions for CIP 002 – CIP 009

NERC deadline approaching – Are you prepared for the new 2009 cybersecurity regulations? Find out how to prepare for the new NERC cybersecurity regulations. All bulk power system owners, operators, and users are responsible for compliance with regulations, measures and standards developed by North American Electric Reliability Corporation (NERC) starting […]

Read More

The Data Quality Imperative in Governance, Risk and Compliance

Organizations pay a significant price as a result of poor quality data. What percent of your data can you trust? You need accurate, trustworthy data to meet today’s GRC requirements. What will it cost your organization if your auditors receive incorrect information? What if your regulatory reports are inaccurate? Download […]

Read More

Extracting Value from Enterprise Log Data

Leverage a log management solution to automate security monitoring and regulatory compliance, conduct forensics, and improve operational standards. Compliance, forensics, security and IT operations teams have long recognized the value that log data can deliver. An effective log management solution can help organizations in several ways: Contain the growing cost […]

Read More

Self-Service SOX Auditing with S3 Control

Learn to minimize time and effort spent on SOX controls and audits through an automated IT control and reporting solution that enables auditors to get information they need to verify compliance without having to depend on IT staff and resources. As corporations come to terms with the implications of SOX […]

Read More

IT Audit Checklist: Information Security

Use this step-by-step guide to conduct a productive audit of your existing enterprise security. Growing threats of fraud require robust security to manage the risk of your company’s information assets. Using this practical, step-by-step guide from the independent IT Compliance Institute (ITCi), you can now conduct an insightful self-assessment of […]

Read More

T&E Expense Management: Leveraging Data to Drive Performance

Learn how to achieve best-in-class performance for managing your company’s T&E expenses. The latest Aberdeen Group research indicates that 80 percent of companies surveyed have seen T&E expenses jump by an average of 14 percent in the last year alone! Best-in-class organizations leverage key technologies and process to achieve: 95 […]

Read More

IDM Butler Technology Audit

BMC Identity Management is a suite that provides end-to-end management of identities for employees, contractors, suppliers, partners, and employees. One of its strengths is the integration with other BMC products. BMC® Identity Management is a suite that provides end-to-end management of identities for employees, contractors, suppliers, partners, and employees. One […]

Read More

How to Reduce Regulatory Delays by Formalizing Design Processes

The path to market for a medical device is fraught with potential obstacles and pitfalls. In this whitepaper, we outline how Arena PLM can help medical device companies achieve the following: Improve design collaboration among global supply chain teams Formalize design and document controls procedures and product record management Streamline compliance […]

Read More

Eagle Bank Uses Single Sign-On to Secure Deposits and Customer Data

Learn how the IT team solved password and security issues for this financial institution. When a security audit revealed the bank’s password-protection vulnerability, Eagle Bank, a mutual bank with over $430 million in assets, turned to Imprivata® OneSign® Single Sign-On (SSO) technology. If you are an IT professional in banking […]

Read More