IT Management  >   Systems Operations  >  

Information Technology Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology Auditing Reports
 
Learn How to Establish an ITAM Program in Less Than 30 Days
sponsored by BDNA
WHITE PAPER: This white paper focus' on a solution that offers a rapid way to get software, hardware and network asset data, cleanse it, and deliver an actionable inventory position. It helps your company prepare for their next inevitable audit and creates the actionable data necessary to build and support a growing ITAM practice within your organization.
Posted: 09 Nov 2016 | Published: 01 Oct 2016

BDNA

3 Ways to Cut the Cost and Pain of a Software Audit
sponsored by BDNA
WHITE PAPER: This white paper examines the top challenges IT professionals face when preparing for a vendor audit, as well as offering suggested solutions to cut the cost and pain of a software audit. Download now to access expert tips on how to prepare for your vendor audit.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

Hardware Neutral Imaging with ImageX: The Ghost Killer
sponsored by Global Knowledge
WHITE PAPER: Learn how ImageX can help facilitate successful image management and lower the total cost of ownership of your Vista implementation.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

How Customers Are Cutting Costs and Building Value with Microsoft Virtualization
sponsored by Microsoft
WHITE PAPER: Virtualization provides powerful, tangible ways to streamline many traditionally time-consuming processes and minimize the resources needed to deploy and manage IT resources. This white paper examines how Microsoft® customers are using virtualization technology to simplify their IT infrastructure, IT processes, and save money.
Posted: 19 Mar 2009 | Published: 03 Nov 2008

Microsoft

Guide: Active Administrator
sponsored by ScriptLogic Corporation
WHITE PAPER: Active Directory becomes very complex to manage in Windows networks. Administrators leave, users are given elevated privileges, applications require special accounts - very soon you have an Active Directory full of security weaknesses.
Posted: 28 Aug 2009 | Published: 20 Jul 2009

ScriptLogic Corporation

Enforcing IT Change Management Policy
sponsored by Tripwire, Inc.
WHITE PAPER: Read this white paper to learn how to enforce IT Control Management policies effectively by fostering a culture of change and enforcing change management processes resulting in greater auditability, improved quality, and IT infrastructure integrity.
Posted: 18 Mar 2009 | Published: 18 Mar 2009

Tripwire, Inc.

Creating a Culture of Change Management
sponsored by Tripwire, Inc.
WHITE PAPER: Download this paper and discover how to create a culture of change management in your organization that mitigates the risk of malicious changes and provides security staff with a reliable, objective view of change across your entire enterprise.
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis...
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

Linux Without Limits: An Introductory Video
sponsored by IBM
VIDEO: In this brief video, you will discover a suite of hardware, software, services, and solutions that will empower you to unleash the full potential of Linux for your business. Tune in to deliver the flexibility and agility your organization craves with this trusted enterprise system, and scale out to 8,000 virtual servers in a single system.
Posted: 24 Feb 2016 | Premiered: 17 Aug 2015

IBM

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change
sponsored by Lumension
WHITE PAPER: Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Posted: 12 Aug 2009 | Published: 01 Sep 2008

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement