IT Management  >   Systems Operations  >  

IT Audits

RSS Feed    Add to Google    Add to My Yahoo!
IT AuditsReports
 
Top Tips for Collecting, Storing, and Analyzing Operations Log Data
sponsored by Hewlett-Packard Company
WEBCAST: View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Your Guide to Improving IT Service Visibility
sponsored by Pangea Systems
WHITE PAPER: This whitepaper details the importance of IT service visibility for providing the performance your users demand and justifying the value of your services.
Posted: 25 Jun 2014 | Published: 20 Mar 2014

Pangea Systems

Webinar: Getting Hadoop Through an IT Audit
sponsored by WANdisco
WEBCAST: Join this webinar from GigaOM Research and WANdisco to learn how enterprises are hardening Hadoop across global data centers to ensure continuous availability, even during maintenance windows.
Posted: 08 May 2014 | Premiered: May 8, 2014

WANdisco

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change
sponsored by Lumension
WHITE PAPER: Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Posted: 12 Aug 2009 | Published: 01 Sep 2008

Lumension

Creating a Culture of Change Management
sponsored by Tripwire, Inc.
WHITE PAPER: Download this paper and discover how to create a culture of change management in your organization that mitigates the risk of malicious changes and provides security staff with a reliable, objective view of change across your entire enterprise.
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor

Hardware Neutral Imaging with ImageX: The Ghost Killer
sponsored by Global Knowledge
WHITE PAPER: Learn how ImageX can help facilitate successful image management and lower the total cost of ownership of your Vista implementation.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Enforcing IT Change Management Policy
sponsored by Tripwire, Inc.
WHITE PAPER: Read this white paper to learn how to enforce IT Control Management policies effectively by fostering a culture of change and enforcing change management processes resulting in greater auditability, improved quality, and IT infrastructure integrity.
Posted: 18 Mar 2009 | Published: 18 Mar 2009

Tripwire, Inc.

PCI Compliance for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided.
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

10 Best Practices for Reducing the Stress of IT Audits
sponsored by Dell Software
WHITE PAPER: This paper presents 10 best practices that can greatly reduce or even eliminate the angst so commonly associated with IT audits.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement