Home
 > Research and Reports > White Papers > Privileged User Monitoring for SOX Compliance

Privileged User Monitoring for SOX Compliance

Source: Tizor
Many companies face the Sarbanes-Oxley (SOX) compliance challenge of monitoring all the data activity of their most privileged users. Those challenges include tracking access to sensitive financial data, reporting on controls, and responding to problems. Learn about a database auditing and protection solution that can help capture targeted activities, without impacting the performance of production databases and software.


Featured publications:

CEBOS Ltd
For over a decade, CEBOS has been a provider of enterprise-wide business improvement, quality management, and compliance software. CEBOS customers range in size from small local firms to Fortune 1000 companies, and come from a variety of industries, including aviation, telecom, health care, automotive, chemical, pharmaceutical, and defense contracting. CEBOS products are user-configurable, allowing companies to meet their own internal requirements as well as specific customer requirements. The company's partners include Microsoft, Exact Software, and Solarsoft. Read More...
Hitachi ID Systems, Inc.
Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management, and password management solutions. They are designed to improve IT security, support internal controls and regulatory compliance, lower administration cost and improve user service. The Hitachi ID Identity and Access Management Suite connects business users to both on-premise and cloud-hosted systems and applications. Read More...
Orchid Orthopedic Solutions Selects CEBOS QMS
Written By: Predrag Jakovljevic Published On: April 23 2014 Orchid Orthopedic Solutions recently selected CEBOS MQ1 Elements Life Sciences solution to automate its quality management system (QMS) and ensure compliance with industry-specific quality standards. Orchid is a worldwide provider of contract design and manufacturing for the orthopedic and medical device markets. Read More...


You may also be interested in these related documents:

Privileged User Management
Source: Quocirca Ltd IT managers feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. But they tend to overlook one particular area of IT security—the privileged access that they grant themselves or their colleagues in order to do their jobs. Learn how to make sure your IT systems are not impacted by the inadvertent or malicious actions of privileged users. Read More...
Compliance and Privileged Password Management
Source: e-DMZ Security Today’s increasing compliance requirements have focused additional attention on how enterprises manage and control these critical accounts and passwords. How can you address the requirement for shared privileged access while still maximizing information security? Find out how traditional solutions may not be providing the security you need—and how upgrading your password system with an automated solution can help. Read More...
Achieving PCI Compliance for Privileged Password Management and Remote Vendor Access
Source: e-DMZ Security Noncompliance with Payment Card Industry (PCI) standards can have a devastating effect on any company that relies on credit card transactions. Contractual penalties and revocation of your rights to process credit card transactions are just two potential repercussions. Though there is no single solution for PCI compliance, you can minimize the risks by staying on top of the latest products and procedures. Learn more. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.