Audit-l is sponsored by Audit Leverage (IAD Solutions, Inc.)
www.auditleverage.com
***************************************


Does anyone know of prevent or detect controls surrounding Zen Works software.

Our IT department uses Zen Works to "take control" of a user's computer and fix IT 
related problems.  Once the IT person has control of the computer, they can 
essentially do anything the user could do (i.e. access to files, execute transactions, 
etc.)

Short of disabling Zen Works for certain applications, does anyone know of prevent or 
detect controls for this type of access?

Audit Leverage is a department management software package that integrates and 
automates the entire audit process.  This comprehensive package includes risk 
assessment, audit planning, budgeting, staffing, scheduling, timekeeping, automated 
work papers, audit findings & recommendations, reporting and audit follow-up.  Audit 
Leverage allows auditors in the field to work off-line and dial in to synchronize 
their work with the Audit Leverage database on the network, enabling managers to 
review the work papers instantly without being at the job site.

Demo available at www.auditleverage.com

If your organization would like to sponsor this discussion list send an e-mail to 
[EMAIL PROTECTED] for information.

To unsubscribe to the Audit-l list send an e-mail to [EMAIL PROTECTED] Leave 
the subject line blank and include the following message in the body:
Unsubscribe audit-l (yourname)

Thanks,
Jim Kaplan
List Manager

Reply via email to