IT Management  >   Systems Operations  >  

Change Control Management

RSS Feed    Add to Google    Add to My Yahoo!
Change Control Management White Papers (View All Report Types)
 
Change Management Best Practices for the Engineering and Construction Industry
sponsored by Oracle Corporation
WHITE PAPER: The purpose of this white paper is to highlight best practices of identifying and managing changes that might occur on a construction project, and provide a process to effectively manage changes on construction projects.
Posted: 08 Oct 2009 | Published: 01 Apr 2009

Oracle Corporation

The Age of Compliance: Preparing for a Riskier and More Regulated World
sponsored by SAP America, Inc.
WHITE PAPER: Most organizations find managing risk and compliance a challenge – but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise – and protect both corporate performance and reputation.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

SAP America, Inc.

Application Lifecycle Management and Business Process
sponsored by Microsoft
WHITE PAPER: This analyst white paper clearly defines how application lifecycle management (ALM) supports business process and even floats the possibility ALM might be even more important, since it creates the underpinnings for all other business processes.
Posted: 03 Mar 2009 | Published: 01 Dec 2008

Microsoft

Managing change in SAP: reducing cost and risk with DevOps
sponsored by IBM
WHITE PAPER: Consult this informative white paper to learn how to tackle the complexity of SAP change without breaking the bank by using a DevOps approach. By bringing development and operations teams closer together, you can achieve continuous innovation and improvement across the entire SAP lifecycle.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

IBM

Choose an ALM solution that meets your strategic requirements
sponsored by IBM
WHITE PAPER: This buyer's guide describes the key criteria for application lifecycle management (ALM) solutions for today's high-performance teams. It includes key considerations for enhancing your single- or multi-vendor ALM environment.
Posted: 09 Mar 2012 | Published: 31 Dec 2011

IBM

Trusted Data Delivery - Help reduce operational costs and risk while improving accessibility of critical business data
sponsored by IBM
WHITE PAPER: This white paper discusses how to reduce operational costs and risk while you improve the accessibility of critical business data. Don't put your business in a catch-up position - be the one in the forefront with the CDC advantage.
Posted: 26 Jul 2011 | Published: 26 Jul 2011

IBM

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Better Active Directory Auditing...Less Overhead, More Power
sponsored by Netwrix Corporation
WHITE PAPER: Today’s stringent legislative and industry requirements Windows server auditing simpler, more reliable, and better able to meet their business requirements. organizations – faced with stricter internal security policies as well as– continue to struggle to make.
Posted: 20 Jul 2010 | Published: 20 Jul 2010

Netwrix Corporation

Audits, Compliance and Security: IT Pros Share Their Experience
sponsored by Dell Software
WHITE PAPER: In this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.
Posted: 16 May 2014 | Published: 16 May 2014

Dell Software

White Paper: SCM: The "Blocking and Tackling" of IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement