Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
The US Sarbanes-Oxley act represents an array of financial reporting and accountability reforms designed to reduce the level of corporate financial fraud and stipulate responsibilities, disclosure requirements and penalties. The implications on IT are widespread particularly for accounting software for sale in the USA which now requires compliance with the requirements of the Sarbanes-Oxley act.
Guide available for Sarbanes-Oxley IT control objectives
ISACA is providing its membership with a free guide to enable them to understand the IT control objectives of the Sarbanes-Oxley regulations
Measuring success in threat management programmes
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
Secure enterprise search capability in office documents
Spreadsheets, presentations and documents can be searched securely across an organisation giving access to valuable collective information assets using DatAnswers
Policy management software for maintaining compliance
Tripwire's enterprise policy management draws on main industry standards and regulations to reduce security exposures and ensure compliance
Managing The Social Impact of Least Privilege Security
Paul Kenyon, COO of Avecto explains how desktop lockdown doesn’t mean taking the personal out of PC
DatAdvantage Provides Pharma Company With User Access Control
A major pharmaceuticals company is using DatAdvantage from Varonis for the management and monitoring of file access activity in the organisation
Three Key Lessons of IT Risk Management
Brian Barnier of ISACA details three key lessons for the prevention of IT security incidents in the enterprise
Enterprise IT Governance Framework
Secure File Sharing For Mobile Users
Accellion has entered an alliance to bring secure file sharing to enterprise mobile users
Improving Security With Automated Compliance
Tufin Technologies sheds light on the use of automated compliance audit software for improving organisational security
EU Legislation effect On US Data Protection
Varonis highlights data protection issues for the USA as a result of forthcoming legislation from the European Union
High Uptake For SharePoint Security Plug-In
Accellion has closed gaps in SharePoint Security with a plug-in designed for Microsoft's popular collaboration tool
Business Risk Profile Changes With IT Consumerisation
Cryptzone warns that as Android devices gain a hold on the market and commercial IT systems become more consumerised, access control policies need reviewing
Guide Available For Cloud Computing Governance
Enhancing value and managing risk in cloud computing implementations is the aim of a new guide available from ISACA on cloud governance
Heavy Consequences For NHS Data Loss
Secureworks comments on the NHS Data Loss reccommending a holistic view of IT security including data loss prevention to avoid such losses
Mainframe Database Activity Monitoring Partnership
Application Security has joined Neon Enterprise Software in alliance to deliver mainframe database activity monitoring to combat insider threat vulnerabilities in large enterprise environments
Using software to extend the security and integrity of corporate IT into the cloud
Corporate responsibility for the security and integrity of IT is increasingly a concern regardless of whether the IT resources are internal or external to the enterprise. As systems have become increasingly open, and remote access is now commonplace, users are continually presented with opportunitie
Synovus Bank tighten security and access controls through Novell Identity Manager
A multi-chartered financial services company with 30 different banks, Synovus Financial was looking to automate user provisioning and streamline access management. By using Novell Identity Manager and Novell Secure Login, Synovus has tightened security while vastly reducing IT costs.
Printing Company Alliances Reduce Costs On Card Printing
HID Global is extending relationships with secure card printing companies to develop means of reducing costs and enhancing environmental sustainability standards
TRUSTe EU Safe Harbour Seal Awarded To Brivo
Brivo adds to its credentials as a safe provider of Software-as-a-Service offerings with the addition of the TRUSTe EU Safe Harbour Seal as well as its existing SAS 70 credentials
Dell Creates Partnerships For Midsize Security Market
Juniper Networks and SecureWorks have entered into partnership with Dell to create a portfolio of security products that Dell will be offering to medium sized businesses
ISACA Calls For Annual Reports To Include Security Breach Data
Responding to calls for mandatory data breach reporting in the UK, ISACA believes that the reporting should be extended to shareholders and other parties through the use of financial reports as the communication vehicle
Latin American Security Report Examines UTM and VPN Uptake in the Region
The security services market in Latin America is examined in a Frost and Sullivan report available from Research and Markets
Enterprise Random Password Manager Prevents Privileged Access Abuse
Regulatory compliance and secure privileged access account credentials extended to ASP.NET web applications with Enterprise Random Password Manager from Lieberman Software
Compliance Reporting Simplification Using Windows Remote Management
Remote reporting using Avecto Privilege guard can be achieved for generating compliance reports across the enterprise
Desktop Degaussing Unit For Erasing Data Tapes
The Erase-O-Matic is now available from Data Devices International for de-magnetising computer backup tapes without the possibility for data recovery
Credant TechnologiesÃÂÃâ€ÂÃâ€Â GOAT - or Glossary of Acronyms And Terminology
Sean Glynn of Credant Technologies sets out to cut through the IT Security Industry's jargon and explain what some of those acronyms really mean in the geek dictionary
Improved Compliance Management from Active Risk Manager
ARM from Strategic Thought brings compliance control management to the enterprise using web-based risk management software
IT Security Top Priority for Nearly Half of Surveyed companiestest
With three-quarters of companies suffering cyber attacks and losing money as a result, Sophos survey reveals increased tendency to invest in robust security measures to protect data and IT systems
Network compliance audit tool available from Intelliden
iAudit is a free cloud-based compliance tool for assessing network device compliance against various standard industry practices
Cloud storage included in latest ArchiveOne release
C2C has released ArchiveOne Enterprise bringing compliance, retention management and eDiscovery into one application
Implementing IAM, combining physical and logical access
Tony Ball, the Identity and Access Management Senior Vice President at HID Global explains the benefits of implementing IAM solutions in the enterprise and how to overcome the barriers
Security considerations in data banking
Peter Bauer of Mimecast examines Information Business 2.0 and what it means for enterprise data banking
US Commercial Data Security reaches crisis levels
With misplaced spending priorities, database audit failures and poor control over data protection, American businesses are losing their grip on data control
Profense Web Application Firewall price reduction
Companies can now improve website application protection and compliance with Profense by taking advantage of 50% price reduction
Central Policy Management for Privileged Accounts
The battle continues for managing privileged identities with Cyber-Ark expanding into the superuser access control market
Secure Unified Communications for SmartPhones
SmartPhone security application from Sipera Systems brings privacy compliant Unified Communications and VoIP capabilities to mobile users
IT Security specialist expands its offering with SecureWorks
Nebulas now offers security and consulting services under the SecureWorks brand including monitoring and intrusion detection
Privileged Identity Management for Oracle environments
Secure access control for Oracle included in Lieberman's Enterprise Random Password Manager
Partnership to generate improved compliance monitoring
ITC Global Security and ArcSight join forces to offer security and compliance management and monitoring for large organisations
Electronic trust solution for online banking
Secure eBanking solution from OpenTrust provides secure transaction capability for corporate and private banking users
Using compliance to gain business value
Lynn Collier of Hitachi Data Systems looks at the opportunities that exist as compliance regulations change and forward thinking companies view the challenge with strategic foresight
Verifi fingerprint reader compatibility with bioLock
Zvetco Biometrics joins forces with realtime to deliver bioLock software for deployment on SAP enterprise resource planning software using Verifi fingerprint biometric readers
Securing privileged identity white paper
Automated and manual methods of controlling privileged access are highlighted in four key steps in a white paper on securing privileged access released by Lieberman Software
Entry level DAT tape back up technology for small businesses
Tandberg is now offering its tape drives and media through the distribution channel providing entry level back up storage for small business users
Joint seminars on privileged identity management
Lieberman is jointly hosting a pair of seminars in California with Microsoft and Lumension on Privileged Identity Management and Data Protection
Increased US customer base for Skybox Security
Risk and compliance management specialist undergoes strong growth within the US market during the last 12 months
Comprehensive plug and play VoIP appliance
The UC-Sec 100 from Sipera Systems provides unified communications and VoIP security for smaller businesses in single plug and play appliance
Lumension joins unified compliance framework
Network Frontiers and Lumension join forces to create global compliance database
Landmark reached at archiving solution provider
C2C now has four million users of its archiving and retention solution for files and e-mail
First | Prev  | 1 | 2 | 3  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo