Section 404 Reports

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

SenSage Event Data Warehouse
sponsored by Hexis Cyber Solutions Inc
PRODUCT LITERATURE: This document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more.
Posted: 01 Aug 2008 | Published: 01 Aug 2008

Hexis Cyber Solutions Inc

Thomas & King Case Study: The Right Ingredients for Software Asset Management
sponsored by Dell, Inc. and Intel®
CASE STUDY: Read this Dell case study to learn how a restaurant franchisee gets its IT cooking with the right reporting from Dell Software Inventory & Usage Management.
Posted: 07 Oct 2009 | Published: 01 Oct 2008

Dell, Inc. and Intel®

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine

Mortgage Company Uses DataFlux Technology to Improve Reporting, Manage Compliance
sponsored by DataFlux Corporation
CASE STUDY: Read how using DataFlux technology, this financial company implemented a data governance program, creating more complete and accurate data and drastically reducing the time needed to comply with Federal reporting regulations.
Posted: 14 Jan 2009 | Published: 14 Jan 2009

DataFlux Corporation

How the Guardium Platform Helped Dell IT Simplify Enterprise Security
sponsored by Guardium, an IBM Company
WHITE PAPER: Safeguarding data is critical for many organizations, but auditing data access activity to comply with regulatory standards can be a complex undertaking. As part of its initiative to simplify IT, the Dell IT group implemented the Guardium platform and database activity monitoring technology. Read this paper to learn so much more.
Posted: 10 Aug 2010 | Published: 10 Aug 2010

Guardium, an IBM Company

The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere
sponsored by Imperva
PRODUCT LITERATURE: Read this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.
Posted: 24 Jul 2007 | Published: 01 Jul 2007

Imperva

Presentation Transcript: Layering Enterprise Security with Next Generation Access Management
sponsored by Oracle Corporation
PRESENTATION TRANSCRIPT: Read this paper to learn more about the current state of security and identity management. The presenters discuss solutions related to enterprise security issues and the benefits of Oracle products.
Posted: 14 Jan 2009 | Published: 14 Jan 2009

Oracle Corporation

E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by Safestone Technologies
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 08 Mar 2011 | Published: 08 Mar 2011

Safestone Technologies