Dell

  • Resource

    Managing the Insider Threat with Active Directory Security

    2016-06-07T11:00:00Provided by

    Explore how the typical insider threat unfolds, and how implementing security best practices can minimize these threats. Read the white paper.

  • Resource

    Selecting Foundational Controls Makes SOX Compliance Easier

    2015-11-02T16:45:00Provided by

    Key components of regulatory compliance include being able to demonstrate the use of appropriate IT-related internal controls that mitigate fraud risk, and the implementation of necessary safeguards for legally protected information that’s electronically stored and transmitted. Read this Dell white paper for a look at SOX security compliance from an ...

  • Resource

    Selecting Foundational Controls Makes PCI DSS Compliance Easier

    2015-11-02T16:45:00Provided by

    Key components of regulatory compliance include being able to demonstrate the use of appropriate IT-related internal controls that mitigate fraud risk, and the implementation of necessary safeguards for legally protected information that’s electronically stored and transmitted. Read this Dell white paper for a look at PCI DSS security compliance from ...

  • Resource

    Managing the Insider Threat with Active Directory Security

    2015-10-29T10:15:00Provided by

    Active directory is a prime target for attackers due to its importance in authentication and authorization for all users. Unfortunately, these breaches don’t always originate from the outside. Read this white paper to explore how a typical insider threat unfolds, and how to use best security practices to defend your ...

  • Resource

    Governance, Risk, and Compliance Software - Maintain Your IT Budget with Consistent Compliance Practices

    2015-08-17T14:15:00Provided by

    Governance, Risk, and Compliance (GRC) software can help state and local governments move from a reactive to a proactive stance with their IT systems. It lets them answer the question, "How long since your last…?" with a comforting "less than an hour ago." Read this third-party report to learn about ...

  • Resource

    Best Practices Guide for IT Governance & Compliance

    2015-08-17T14:15:00Provided by

    Federal regulations, such as the Sarbanes-Oxley Act (SOX), the Health Insurance Portability Accountability Act (HIPAA), and the more recent Payment Card Industry (PCI) initiative, require businesses to know exactly what changes are being made to structured and unstructured data in their corporate networks. As a result, IT organizations need to ...

  • Resource

    Ensuring Enterprise Visibility, Auditing, and Reporting for Windows Environments

    2015-08-14T15:00:00Provided by

    Systems and security administrators must achieve and prove IT compliance and security, support active directory migrations, and report on the configuration of active directory, Windows file servers, and SQL servers across their enterprise. With a manual approach, these become Herculean, error-prone tasks that increase the risk of security breaches and ...

  • Resource

    Insider Threat Spotlight Report

    2015-08-05T10:45:00Provided by

    Get comprehensive survey findings from more than 500 cyber-security professionals, all offering unique insights into the state of insider threats today, as well as the best solutions to keep your network protected. Find out how your peers can help you: