IT Management  >   Systems Operations  >  

Information Technology Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology Auditing Reports
 
Learn How to Establish an ITAM Program in Less Than 30 Days
sponsored by BDNA
WHITE PAPER: This white paper focuse on a solution that offers a rapid way to get software, hardware and network asset data, cleanse it, and deliver an actionable inventory position. It helps your company prepare for their next inevitable audit and creates the actionable data necessary to build and support a growing ITAM practice within your organization.
Posted: 09 Nov 2016 | Published: 01 Oct 2016

BDNA

Is Artificial Intelligence on the March to Replace Traditional IT Administrators?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
Posted: 07 Nov 2016 | Published: 08 Nov 2016

ComputerWeekly.com

5 Ways to Cut Spending on SAP Software
sponsored by Snow Software
RESOURCE: Discover how to reduce SAP licensing costs with holistic Software Asset Management. Download this resource to examine five key initiatives to drive significant SAP savings—and avoid the pitfalls of overspending.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Snow Software

Enforcing IT Change Management Policy
sponsored by Tripwire, Inc.
WHITE PAPER: Read this white paper to learn how to enforce IT Control Management policies effectively by fostering a culture of change and enforcing change management processes resulting in greater auditability, improved quality, and IT infrastructure integrity.
Posted: 18 Mar 2009 | Published: 18 Mar 2009

Tripwire, Inc.

Top Tips for Collecting, Storing, and Analyzing Operations Log Data
sponsored by Hewlett Packard Enterprise
WEBCAST: View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

Your Guide to Improving IT Service Visibility
sponsored by Pangea Systems
WHITE PAPER: This whitepaper details the importance of IT service visibility for providing the performance your users demand and justifying the value of your services.
Posted: 25 Jun 2014 | Published: 20 Mar 2014

Pangea Systems

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change
sponsored by Lumension
WHITE PAPER: Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Posted: 12 Aug 2009 | Published: 01 Sep 2008

Lumension

Linux Without Limits: An Introductory Video
sponsored by IBM
VIDEO: In this brief video, you will discover a suite of hardware, software, services, and solutions that will empower you to unleash the full potential of Linux for your business. Tune in to deliver the flexibility and agility your organization craves with this trusted enterprise system, and scale out to 8,000 virtual servers in a single system.
Posted: 24 Feb 2016 | Premiered: 17 Aug 2015

IBM

10 Best Practices for Reducing the Stress of IT Audits
sponsored by Dell Software
WHITE PAPER: This paper presents 10 best practices that can greatly reduce or even eliminate the angst so commonly associated with IT audits.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Dell Software

Creating a Culture of Change Management
sponsored by Tripwire, Inc.
WHITE PAPER: Download this paper and discover how to create a culture of change management in your organization that mitigates the risk of malicious changes and provides security staff with a reliable, objective view of change across your entire enterprise.
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement