IT Management  >   Systems Operations  >  

Change Control Management

RSS Feed    Add to Google    Add to My Yahoo!
Change Control Management White Papers (View All Report Types)
 
Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

SAP System Build and Landscape Management Activities
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components.
Posted: 22 Nov 2011 | Published: 30 Jun 2010

Cisco Systems, Inc.

Practical Steps to Achieve and Maintain NERC Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.
Posted: 31 Jul 2009 | Published: 08 Dec 2008

Tripwire, Inc.

A Lifecycle Approach to Systems Quality: Because You Can’t Test in Quality at the End
sponsored by IBM
WHITE PAPER: This white paper looks at approaches for effectively integrating quality management into lifecycle activities and the potential benefits this can deliver for project and business outcomes.
Posted: 17 Mar 2010 | Published: 17 Dec 2009

IBM

Business Process Acceleration Within Oracle E-Business Suite
sponsored by UC4 Software, Inc
WHITE PAPER: This white paper examines how to overcome the challenges presented by the Oracle E-Business Suite and significantly increase your ROI.
Posted: 11 Aug 2011 | Published: 31 Dec 2010

UC4 Software, Inc

Orchestrating Mainframe and Distributed SCCM and Release Management
sponsored by SERENA Software, Inc.
WHITE PAPER: Read this white paper to find an integrated approach to software change and configuration management. Learn how to effectively balance the need for change v. availability of resources and make rational business decisions without disrupting your audit trail.
Posted: 23 May 2012 | Published: 23 May 2012

SERENA Software, Inc.

BI for the People – and the 10 Pitfalls to Avoid in the New Decade
sponsored by Qlik
WHITE PAPER: This paper outlines the 10 common pitfalls associated with traditional BI approaches that prevent organizations from getting full value from their BI investments. Continue reading to learn more about these 10 pitfalls and how to avoid them in the new decade.
Posted: 29 Sep 2010 | Published: 29 Sep 2010

Qlik

White Paper: SCM: The "Blocking and Tackling" of IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement