IT Management  >   Systems Operations  >  

Information Technology Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology AuditingReports
 
Software Asset Management (SAM) 101
sponsored by CDW Corporation
VIDEO: CDW offers consulting for software asset management to avoid or reconcile licensing issues. Watch this informative video to learn how launching a CDW partner's tool, Snow Software, allows administrators to see which tools are in use and can then meet with a CDW account executive to plan a licensing program.
Posted: 21 Oct 2014 | Premiered: 30 Sep 2014

CDW Corporation

Your Guide to Improving IT Service Visibility
sponsored by Pangea Systems
WHITE PAPER: This whitepaper details the importance of IT service visibility for providing the performance your users demand and justifying the value of your services.
Posted: 25 Jun 2014 | Published: 20 Mar 2014

Pangea Systems

The Drive to Greater Data Center Efficiency
sponsored by Tideway Systems
WHITE PAPER: Trying to plan data center optimization projects without an accurate picture of the very assets you are trying to optimize is an exercise in futility. The results of this approach are well known...
Posted: 20 Apr 2008 | Published: 01 Apr 2008

Tideway Systems

PCI Compliance for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided.
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

Taking Control of Software Licensing
sponsored by BDNA
WHITE PAPER: Software licensing is full of complexity and factors outside your control. Having accurate information is the best strategy for managing vendors, negotiating with them, and avoiding vendor audits. This paper offers insight to enter conversation...
Posted: 30 Apr 2008 | Published: 01 Apr 2008

BDNA

Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor

Enforcing IT Change Management Policy
sponsored by Tripwire, Inc.
WHITE PAPER: Read this white paper to learn how to enforce IT Control Management policies effectively by fostering a culture of change and enforcing change management processes resulting in greater auditability, improved quality, and IT infrastructure integrity.
Posted: 18 Mar 2009 | Published: 18 Mar 2009

Tripwire, Inc.

Hardware Neutral Imaging with ImageX: The Ghost Killer
sponsored by Global Knowledge
WHITE PAPER: Learn how ImageX can help facilitate successful image management and lower the total cost of ownership of your Vista implementation.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis...
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

10 Best Practices for Reducing the Stress of IT Audits
sponsored by Dell Software
WHITE PAPER: This paper presents 10 best practices that can greatly reduce or even eliminate the angst so commonly associated with IT audits.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement