Evaluating compliance software and solutions

Email Alerts

Register now to receive SearchCompliance.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Webcast: Keys to reducing cloud computing risks and security concerns

    In the concluding segment of this webcast, learn best practices companies can implement to alleviate cloud computing risks and security concerns.

  • audit log (AL)

    An audit log is a document that records an event in an information (IT) technology system.

  • access list (AL)

    An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.  The asset can be a building, a room or a computer file. 

  • Log management tightens data security and IT performance

    Log management is a compliance cornerstone in today's enterprise IT environment. The chief benefit of log management is the way in which it offers IT compliance officers the ability to ferret out malicious behaviors and data security threats posed both by internal users and external threats. Given the proliferation of data in modern organizations and corresponding concerns about unauthorized access, this is not a minor consideration. A committed log management strategy can also help IT executives sort through operational bottlenecks at all levels of the enterprise by cataloging incidents and allowing for a simpler review of this information. In this log management buyer's guide, find out how a log management program can guide you in managing your organization's security and operational concerns. This guide also contains a list of vendors offering their services in the log management arena.

  • The role of metadata management in information governance strategy

    In this video, learn the importance of metadata to your organization's records management plan and how it influences information governance strategy.

  • Survey: Mobile device protection a top priority for IT professionals

    Mobile device protection is a major concern for IT departments, a SearchCompliance.com survey found. Here's expert advice on mobile strategy trends and how the cloud can help.

  • event log manager (ELM)

    An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.

  • database activity monitoring (DAM)

    Database activity monitoring (DAM) systems monitor and record activity in a database and then generate alerts for anything unusual.

  • Log management software can aid data security, boost IT accountability

    Log management software can play a vital role in data security and assuring IT accountability. Looking to start or advance your program? Learn how to handle your logs.

  • Product Spotlight: Log management, security, GRC data evaluation

    Our latest roundup of IT compliance products features software to help with log management, data security protection and localized governance, risk and compliance data assessment.

  • VIEW MORE ON : Log management software