net iq

Results 176 - 200 of 215Sort Results By: Published Date | Title | Company Name
Published By: NETIQ     Published Date: Mar 12, 2013
In this paper, we will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Tags : 
security information, event management, log management, pci dss, security
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
This whitepaper discusses the challenges of meeting PCI DSS compliance, as well as the ways in which organizations can leverage that work to provide better security.
Tags : 
pci dss compliance, security compliance, it management
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Regulatory compliance has become an important corporate initiative as the complexity and scope of the regulatory environment increases. Organizations are searching for an effective, sustainable, and scalable approach that will achieve their compliance
Tags : 
security, compliance, it security, sustainable compliance, security management, it management
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Sally Hudson, IDC research and analysis, sums up thoughtful Q&A session that highlights evaluating access governance solutions, developing agile processes and policies that meet security and compliance needs.
Tags : 
idc research, governance solutions, netiq
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Is change and complexity causing you to rethink your approach to identity, security and governance? Examine some of the challenges organizations face when developing and adapting a compliance program.
Tags : 
iag, identity management, access governance, it security, compliance
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : 
security and compliance in the cloud
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity as a service, authentication, authorization, open web, iam, saml, oauth, opened, scim, spml, xacml
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This Forrester Technology Adoption Profile (TAP) shows how growth in mission-critical applications is driving disaster recovery initiatives, enhanced disaster recovery capabilities shorten recovery objectives and the future of disaster recovery rests with advanced continuity tools. To learn more, download your copy of this informative Forrester TAP today.
Tags : 
netiq, disaster recovery, replication, recovery, forrester, technology adoption profile, mission critical, white paper, downtime, continuity plan, continuity tools
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies, mitigating risk, pum
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This paper contains three simple steps for maintaining visibility and control when moving to the cloud and explains how NetIQ can help with each.
Tags : 
netiq, cloud infrastructure, cloud computing, security risks, regulations, information security, compliance management, public cloud, private cloud, hybrid cloud, cloud security, cloud, data security, it security, cloud service, cloud technology, cloud solution, security management
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
Virtualization technology can solve the cost vs. time dilemma that traditional data recovery solutions pose, enabling organizations to quickly and cost-effectively recover all server workloads. To learn more, download your copy of this NetIQ paper today.
Tags : 
netiq, white paper, disaster recovery, workload mirroring, removable-media backup, server workload, virtualization technology
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This white paper looks at the most important elements of securing sensitive health information and meeting HIPAA compliance requirements in a scalable and cost-effective way.
Tags : 
netiq, security, hipaa, compliance, protected health information, hitech act, compliance requirements, healthcare
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet IT’s demands and simple for non-IT professionals to manage.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
In your business environment, providing affordable protection for your physical and virtual servers is critical. This free NetIQ Disaster Recovery eBook outlines important topics you need to understand to protect today’s data centers. Download your copy of the guide and learn more.
Tags : 
netiq, disaster recovery, protection, physical server, virtual server, ebook, multi-platform data center, cloud computing, virtualization, roi
    
NETIQ
Published By: NETIQ     Published Date: Dec 03, 2013
This flash point paper discusses system and application management and the struggle against service outages. With data overload and data isolation often being the root cause, a services-level approach can reduce the potential of impacting events.
Tags : 
netiq, service outages, monitoring strategy, system failure, single management view
    
NETIQ
Published By: IBM     Published Date: Nov 14, 2014
Security is a growing concern in our increasingly connected Internet of Things. Everything that is connected is potentially subject to malicious and criminal attack. Learn how to incorporate security analysis and development techniques to build secure smarter systems.
Tags : 
security, cyber physical systems, agility, product development, security analysis, secure smarter systems
    
IBM
Published By: Cisco     Published Date: Nov 17, 2015
See the Connected Factory at Work Agenda: - Understanding the Connected Factory and its benefits to the organization's overall profitability - Case studies: reducing costs, increasing quality, and maximizing productivity - The building blocks of an IoT network: unique design considerations for environments with rigid requirements
Tags : 
techwise tv, connected factory, webinar
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: