IT Agents  >   Standards Organizations  >   National Standards Organizations  >  

German Institute for Standardization

RSS Feed   
German Institute for Standardization White Papers (View All Report Types)
 
Does Your Service Management Solution Meet the Needs of a Modern Organization?
sponsored by Ivanti
WHITE PAPER: Think about your IT organization. Does it look the exact same as when your current IT service management tools were first deployed? Odds are, probably not. Unlock access to an exclusive ITSM checklist that explains how to properly measure your service management tools ability to keep up with change.
Posted: 01 Oct 2020 | Published: 29 May 2020

Ivanti

Secure IT Asset Disposition: Achieving Business Value While Mitigating Risks
sponsored by Iron Mountain
WHITE PAPER: The risks of not having an IT asset disposition (ITAD) solution are substantial.Download this white paper for advice on how to dispose of old IT equipment successfully while achieving security, compliance, and environmental goals.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Iron Mountain

Real World Stories of IT Admin Heroes
sponsored by Pure Storage
WHITE PAPER: Check out this compendium of case studies to see 7 shining examples of everyday IT admin heroes as they use Pure Storage to help their organizations simplify and transform operations for mission-critical databases, virtualized environments, and analytics with all-flash and NVMe.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Pure Storage

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

z Cisco Aironet 1200 Series Access Point
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: Cisco® Aironet® 1200 Series access points deliver the investment protection, versatility, and enterprise-class features demanded by wireless LAN customers.
Posted: 10 Jul 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.

Setting standards in IT Industries
sponsored by DLT Solutions
EGUIDE: Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.
Posted: 19 Mar 2012 | Published: 16 Mar 2012

DLT Solutions

The Need for Cloud Computing Security Standards
sponsored by SearchSecurity.com
EGUIDE: While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

DNSSEC - Secure DNS For Government
sponsored by BlueCat
WHITE PAPER: This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines.
Posted: 01 Sep 2010 | Published: 31 Aug 2010

BlueCat

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
sponsored by ISACA
WHITE PAPER: This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives.
Posted: 10 Feb 2010 | Published: 01 Dec 2009

ISACA

Herding Geese: The Retail Supply Chain
sponsored by ComputerWeekly.com
BOOK: Steven Keifer draws on the pioneering work of US retailer, Walmart, to explain the essentials of EDI in the retail supply chain.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020

Contrast Security

Case Study: SSB Wind Systems, End-To-End Service Mitigates Information Risks
sponsored by Iron Mountain
CASE STUDY: This short white paper discusses how one organisation transformed its data and records management processes through end-to-end off-site data protection and records management services.
Posted: 16 Oct 2013 | Published: 31 Dec 2012

Iron Mountain

NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

The Adobe EchoSign advantage for financial services
sponsored by Adobe EchoSign
WHITE PAPER: E-signatures offer financial institutions sustainable competitive advantages while meeting high industry standards. Access this white paper to learn more.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Adobe EchoSign

Five Pillars of an actionable Cloud Security Framework in Azure
sponsored by Barracuda
WHITE PAPER: In order to ensure a responsible cloud migration, organizations need to ensure that they secure the network, applications and data that will reside in their cloud environment. This white paper takes the widely used NIST Cybersecurity Framework and turns it into 5 actionable pillars. Read on to get started.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Barracuda

HP Thin Clients for Healthcare
sponsored by HPE
WHITE PAPER: Read on to learn how HP Thin Clients are trusted by healthcare institutions around the world to help them support strict data privacy standards, deliver reliability, and streamline IT.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

TOPICS:  IT Management
HPE

High Performance, High Capacity 2048/4096-bit SSL Offload
sponsored by A10 Networks
WHITE PAPER: This informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.
Posted: 24 Sep 2013 | Published: 28 Feb 2013

A10 Networks

Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in an offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant

Top Monitoring Tools to Help Meet Regulatory Compliance Standards
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

SearchSecurity.com

Case Study: How Standard Bank Simplified with DevOps
sponsored by Chef Software
WHITE PAPER: Access this whitepaper to see how Standard Bank took decades of disparate legacy platforms and simplified their development process. Read on to see the important role DevOps took for the financial institution, and what advantages they are now experiencing.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

Chef Software

Automate Data Security
sponsored by Red Hat
WHITE PAPER: Financial services firms must comply with a range of increasingly strict security and privacy standards. However, using joint solutions can take a DevSecComplianceOps approach to automate application building, testing, and deployment. View this white paper to learn more.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Red Hat

The Path to IFRS Conversion: Considerations for the banking and capital markets industry
sponsored by Deloitte
WHITE PAPER: As acceptance of IFRS in the United States becomes imminent, more banks and capital markets institutions are asking key questions: How does IFRS affect my institution? What events would influence my institution's pace of IFRS adoption? What obstacles might we need to consider? Read this paper to learn the answers to these questions and more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

Third-Party Risk Management: Evaluating and Contracting with Vendors
sponsored by BitSight
EGUIDE: This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight

Complying with APRA Prudential Standard CPS 234
sponsored by Thales
WHITE PAPER: This white paper provides recommendations to APRA regulated entities on implementing key APRA practice guidelines (CPG 234) to comply with the requirements of CPS 234. Read on to get started.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Thales

Deutsche Post DHL Case Study Enterprise Agility through DevOps
sponsored by CollabNet
CASE STUDY: Read this brief case study to discover how global company Deutsche Post DHL leveraged an agile application lifecycle management (ALM) platform to implement better IT governance, streamline collaboration and sharing software modules, automate and standardize application delivery, and gain visibility into source code and software partner information.
Posted: 01 Mar 2012 | Published: 31 Dec 2011

CollabNet

Integrating and monitoring business-to-business (B2B) value chains
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Rob Bamforth offer advice on putting in place an effective, integrated, overall B2B solution.
Posted: 14 Jan 2013 | Published: 04 Sep 2012

ComputerWeekly.com

Collab Net Success Story
sponsored by CollabNet
CASE STUDY: Discover how a large investment banking firm with locations in 35 countries rolled out a quick, repeatable and flexible agile development process that is consistent across the organization and in compliance with CMMI.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

CollabNet
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info