IT Management  >  

IT Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Information Technology Governance, Governance
DEFINITION: IT governance is a structure of processes that govern decision making around investment decisions, client relationships, project management and other important IT operational areas.
IT GovernanceReports
126 - 150 of 159 Matches Previous Page  | Next Page
eBook: Compliance for the Midmarket: Governance, Risk and Technology
sponsored by SearchCIO.com
EBOOK: Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
Posted: 09 Jun 2009 | Published: 09 Jun 2009

SearchCIO.com

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

How Customers Are Cutting Costs and Building Value with Microsoft Virtualization
sponsored by Microsoft
WHITE PAPER: Virtualization provides powerful, tangible ways to streamline many traditionally time-consuming processes and minimize the resources needed to deploy and manage IT resources. This white paper examines how Microsoft® customers are using virtualization technology to simplify their IT infrastructure, IT processes, and save money.
Posted: 19 Mar 2009 | Published: 03 Nov 2008

Microsoft

SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by SearchWinIT
EZINE: In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

SearchWinIT

Symantec IT Compliance Solution
sponsored by Symantec Corporation
PRODUCT LITERATURE: Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Symantec Corporation

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams
sponsored by Qualys, Inc.
WHITE PAPER: This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Qualys, Inc.

Leadership Makes the Difference during Times of Global Financial Crisis: Optimizing Business Cycles through Technology Investment
sponsored by SAP America, Inc.
WHITE PAPER: Investing in the right IT platform and end-to-end business processes enables companies to simplify the IT landscape and reduce total it cost.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

IT Governance in an IBM Lotus Software Environment
sponsored by Sherpa Software
IT BRIEFING: This document describes concepts and definitions for governance, elements of governance, distinguishing myth from reality, approaches that go beyond "just good enough", control frameworks etc.
Posted: 16 Jan 2009 | Published: 16 Jan 2009

Sherpa Software

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
sponsored by SearchSecurity.com
EBOOK: Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

SearchSecurity.com

Sharepoint E-zine Vol.4: Balancing SharePoint Governance
sponsored by SearchWinIT
EZINE: SharePoint has built-in features that allow site owners to create site maps without any custom coding at all.
Posted: 18 Nov 2008 | Published: 18 Nov 2008

SearchWinIT

Sharepoint E-zine Vol.3: Using SharePoint's InfoPath feature to generate forms
sponsored by SearchWinIT
EZINE: This guide explains planning global enterprise SharePoint deployments, creating custom global search scopes in SharePoint and top tips for harnessing Microsoft SharePoint governance.
Posted: 24 Oct 2008 | Published: 23 Oct 2008

SearchWinIT

Making the FACTA Red Flags Rules Operational
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA, The Security Division of EMC

Enterprise Architecture Is More than Engineering
sponsored by Burton Group
WHITE PAPER: While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness.
Posted: 18 Jul 2008 | Published: 01 May 2008

Burton Group

Innovation in Governance, Risk and Compliance
sponsored by CA Technologies.
WHITE PAPER: The nature of enterprise risk associated with IT is becoming more varied and complex each year. This paper discusses how companies can respond how companies can respond to growing regulation and increasingly complex business service architectures.
Posted: 26 Jun 2008 | Published: 01 Oct 2007

CA Technologies.

What Your CIO Should Know: Automated Policy Enforcement and Desired State for Enterprise PCs
sponsored by Persystent Technologies
WHITE PAPER: Automating PC policy enforcement and desired state ensures that local and remote desktops and laptops remain compliant and maintain optimum availability which helps companies reduce PC support costs, and enhance user productivity and satisfaction.
Posted: 10 Jun 2008 | Published: 01 Jan 2007

Persystent Technologies

Three Keys to Effective Service-oriented Architecture Governance
sponsored by Accenture
WHITE PAPER: While most leading companies' IT organizations are well on the way to adopting service-oriented architecture capabilities, many find their progress slowed by questions about who owns business services.
Posted: 03 Jun 2008 | Published: 01 Mar 2008

TOPICS:  IT Governance
Accenture

A Guide to SOA Governance
sponsored by Torry Harris Business Solutions
WHITE PAPER: This white paper provides a guide to a successful SOA governance. Explore the integral role governance plays in realizing optimal ROI from an SOA implementation.
Posted: 24 Apr 2008 | Published: 24 Apr 2008

Torry Harris Business Solutions

Governance: The CIO's - and the Board's - Business
sponsored by Compuware Corporation
WHITE PAPER: This white paper discusses the evolving role of IT governance in the organization. Explore the steps necessary to attain a strong and successful IT governance framework.
Posted: 11 Apr 2008 | Published: 01 Apr 2008

Compuware Corporation

Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER: Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance
sponsored by IBM
WHITE PAPER: This paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor...
Posted: 19 Nov 2007 | Published: 01 Mar 2007

IBM

Enterprise Change Management: Blending Technology with Best Practices to Improve IT Efficiency & Achieve Compliance
sponsored by SunView Software Inc.
WHITE PAPER: Effective change management is required to rapidly and successfully respond to new challenges. Get an in-depth explanation of the available technologies and best practice frameworks that exist to help organizations control change activities.
Posted: 04 Sep 2007 | Published: 01 Sep 2007

SunView Software Inc.

HP's Universal CMDB: A Balanced Approach to Unifying IT Operations, Service Desks, and Business Objectives
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, read about the evolution of Configuration Management Database (CMDB) adoption in the market, CMDB solution integration and the overall architecture requirements for CMDB.
Posted: 24 Aug 2007 | Published: 01 Jan 2007

Hewlett-Packard Company

Video: Move Beyond Efficiency to Deliver Value with IBM Service Management
sponsored by IBM Software Group
WEBCAST: IBM Service Management can help IT organizations deliver service excellence, through a structured approach that can enable better governance and help manage risk, delivering business value. Watch this video to learn how you can deliver quality ...
Posted: 20 Jun 2007 | Premiered: Jun 20, 2007

IBM Software Group

PCI Compliance: The CA Solution
sponsored by CA Technologies.
PRODUCT LITERATURE: CA offers solutions that can not only greatly protect assets and information related to cardholders, but can also help reduce overall IT costs by automation of many IT processes related to the protection of this information.
Posted: 15 May 2007 | Published: 01 Sep 2006

CA Technologies.
126 - 150 of 159 Matches Previous Page    4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement