database compliance audit

Results 1 - 9 of 9Sort Results By: Published Date | Title | Company Name
Published By: BMC Software     Published Date: Aug 26, 2014
Is your IT Automation strategy saving you money or just becoming more complex and costly? With the right unified strategy, IT Automation can pay for itself and deliver far more business value. Watch this on-demand webinar, “New Strategies to Manage IT Automation Complexity” and learn how to: • Reduce costs by integrating automatio n for servers, middleware, networks and databases • Eliminate manual and tedious IT Operations tasks with both new and existing technology • Save time and money by consolidating configuration management processes across your IT infrastructure • Transform compliance, audit that and remediation from a stressful event to a standard practice Become part of the Automation revival is serving as a catalyst for IT Operations. Watch this on-demand webinar and learn how to integrate your IT automation strategy.
Tags : 
it automation, strategy, operations, it infrastructure, automation, it management
    
BMC Software
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance, database activity monitoring, database vulnerability management, pci audit, anti spam, anti spyware, anti virus, compliance, disaster recovery, encryption, firewalls, hacker detection, internet security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware, anti virus, application security, business continuity, compliance, disaster recovery, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, vulnerability management, data loss prevention
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley, hipaa, hitech, ssae, access control, anti spam, anti spyware, anti virus, auditing, business continuity, compliance, disaster recovery, encryption
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.
Tags : 
database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting, anti spyware, anti virus, auditing, ddos, internet security, intrusion detection, intrusion prevention, web service security, vulnerability management, virtualization, cloud computing
    
McAfee
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, disaster recovery, email security
    
McAfee
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security, auditing, security management, business activity monitoring, database development, database security
    
NetIQ
Search      

Add Research

Get your company's research in the hands of targeted business professionals.