Sarbanes-Oxley (SOX) Section 404 Reports

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
sponsored by BWise
EGUIDE: This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
Posted: 28 Oct 2010 | Published: 28 Oct 2010

BWise

APTARE StorageConsole Backup Manager
sponsored by APTARE
DATA SHEET: This informative paper examines a backup and recovery software solution that can help you increase your backup and restore success, streamline compliance, improve backup performance and much more. Read on to learn more.
Posted: 25 Oct 2013 | Published: 30 Aug 2013

APTARE

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
sponsored by Information Security Magazine
EZINE: November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010

Information Security Magazine

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Aligning Business and IT through Connected Requirements: Unifying the Development Process
sponsored by IBM
WHITE PAPER: Check out this white paper to learn how the connected-requirements approach serves as the framework for the use of products and technologies that are designed to allow you to optimize team performance, align the development process with your organization's business goals and meet auditing and regulatory compliance requirements.
Posted: 20 Feb 2009 | Published: 01 Oct 2008

IBM

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Cirrus Configuration Manager
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Cirrus Configuration Manager.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

SolarWinds, Inc.

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
sponsored by Tripwire, Inc.
WHITE PAPER: To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance.
Posted: 08 Jan 2009 | Published: 08 Jan 2008

Tripwire, Inc.

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

TechTarget Security