• checklist for moving datacenter

    Hello. Our company have a plan to move datacenter in a month and my boss ordered me to make out the plan for it. But I don't know how to do it, especially I have no idea about what I should check for moving datacenter. Help me! How can I get the process, checklist.... for moving datacenter?

    Chosang10 pointsBadges:
  • PCI compliance 1.4(b) on personal firewalls

    Requirement 1.4(b) asks if personal firewall software is not alterable by employee-owned computer users. If we allow employees to alter their personal firewall software settings, what other compensating controls could we implement in order to meet satisfy the objective of this requirement?

    Eb100255 pointsBadges:
  • How to Monitor File Changes done thru STRSQL

    I need a solution for monitoring file changes done by programmers using the STRSQL from a command line for SOX purposes.

    poorboy01105 pointsBadges:
  • Hercules 4.5 Compliance Check

    We currently use Hercules 4.5 to back up our SCCM for audits and remediations.  When using Hercules audit, the customer receives a pop-up in the bottom right hand of their screen telling them that a compliance check is about to be performed on their system.  The reaction of the customers are...

    Harisheldon19601,420 pointsBadges:
  • PCI-DSS Scope minimization

    i am trying to prepare a methodology on how to implement PCI-DSS.i prepared my scope but now i want to know what are the exact steps which one would have to follow to SHRINK OR MINIMIZE SCOPE. can someone help me. Thank you

    Ritik5 pointsBadges:
  • IT sites SOX as reason we can not diag. Dropped packet problem in setting up IP Phone system.

    We have wasted 20 hours proving to another IT company that the issues are in their firewall.  They will not let us even see what they are doing...quoting SOX as the reason.  We have finally told the customer that unless we can not see their configuration, they will need to purchase another...

    TNTGRP15 pointsBadges:
  • Power Point 2003 vs. 2007 PCI DSS Compliance

    Would migrating to Power Point Viewer 2007 change PCI DSS compliance in any way if all patches were applied to 2007?  i.e., does the newer version bring anything like ActiveX into the picture?

    mperry2915 pointsBadges:
  • Data Protection Act [UK]

    Hi, Can anyone point me in the direction of an up-to-date summary [in layman's terms] of this act? Thanks in advance

    Mattaux0 pointsBadges:
  • Adding NICs to my machine to run VMs from my Windows 7 computer

    If I want to run multiple VMs from my Windows 7 computer, I will need 6 NICs. How can I add 6 NICs to my machine? Are there ethernet banks or a single PCI card with lots of ports?

    Troubleshooter24755 pointsBadges:
  • PCI Simple Communications Controller

    What is the PCI Simple Communications Controller used for?

    Ericjaxn5 pointsBadges:
  • AS400 System Value Settings Help?

    In our AS400 environment there are several individuals who has *SECADM and *ALLOBJ authority due to some reason, we are trying to investigate few incidents of system value settings which were changed but we don't who did it, any help or workaround which can lead us to the right path?

    ZahoorHyder5 pointsBadges:
  • Application Access Control Management

    Is there an enterprise wide software management program that can manage access to our web-based applications, vendor specific programs located thru out the entire company, and our MS applications, including MS Outlook? In other words, we would like to control all of the various software programs...

    NBf9910 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • SAS-70 certification

    I have a quick question regarding SAS-70 Certification. If my company completes a SAS-70 audit, does that automatically make us certified or are there additional steps for certification? also when we get certified how long does that certification last before it will need to be renewed? any...

    JohnDough5 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Checking TCP Servers

    I need to code a program that will confirm that certain TCP Servers such as TFTP are NOT started per PCI requirements as they are insecure

    JerryBushika5 pointsBadges:
  • Open IT Forum: How do you raise awareness for security compliance in the enterprise?

    We've gotten your opinions on network security from the hardware and software side, but now we want to know what you're doing for compliance. From what your compliance policies are to the creative ways you raise awareness about those policies, share your stories and you might get 100 knowledge...

    MelanieYarbrough6,345 pointsBadges:
  • How to begin attempting to build and sustain security for our information assets?

    I recently learned about SKiP, Security Knowledge in Practice, in one of my classes at UAT and I am very intrigued by it.  I did not realize that the problem-based approach was the common.  I guess that is one of the great advantages of SKiP, being a process-based approach to organize and...

    JJUAT5 pointsBadges:
  • Changing proxy rights for select users

    I work in a company that has a proxy who can limit the people acces into some sites,my question is...what changes can i do to  the proxy server to accept these sites for one or more users?(usual changes into one basic proxy server)

    Razvan19875 pointsBadges:
  • Comprehensive distributed software management policy and standards

    Could anyone share or provide input on a comprehensive distributed software management policy and standards that prohibit non-developer access to source code and prohibit developers from creating executable code and placing it in migration folders (which then can be moved to test and production)?

    Debby10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following