IT Management  >   Systems Operations  >  

IT Audits

RSS Feed   
IT Audits Reports
 
Palo Alto Networks rockets resiliency by transforming IT
sponsored by ServiceNow
WEBCAST: Problem management is an IT service management process that follows the life cycle of underlying service problems. In this webinar, learn how Palo Alto simplified problem management processes using digital workflows and automation, and how you can do the same at your organization.
Posted: 09 Nov 2020 | Premiered: Nov 9, 2020

ServiceNow

IR35 reforms: Confusion over who pays employers' NI leaves IT contractors out of pocket
sponsored by ComputerWeekly.com
EGUIDE: Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

ComputerWeekly.com

Top Limitations of SAM Tools Guide
sponsored by ClearEdge
WHITE PAPER: There is a common misconception that Software Asset Management (SAM) tools can completely mitigate your risk of a costly and disruptive audit. This guide reviews the top limitations of SAM tools.
Posted: 13 Sep 2021 | Published: 13 Sep 2021

ClearEdge

SAM: Managing the hidden costs in software and cloud subscriptions
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we discover how software asset managers are coming up with new ways to give employees freedom and flexibility whilst keeping the ability to easily audit what is being used on-premise and in the cloud as well as what is no longer being used.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

ComputerWeekly.com

Computer Weekly – 8 November 2016: The march of the robot workers
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.
Posted: 07 Nov 2016 | Published: 08 Nov 2016

ComputerWeekly.com

IR35 reforms: Confusion over who pays employers’ NI leaves IT contractors out of pocket
sponsored by ComputerWeekly.com
EGUIDE: Litigators are circling as thousands of contractors realise that the 2017 roll-out of IR35 reforms to the public sector may have resulted in unlawful tax deductions – and the private sector could be next.
Posted: 27 Aug 2021 | Published: 26 Aug 2021

ComputerWeekly.com

Presentation Transcript: Managing Windows with IT Search
sponsored by Splunk
PRESENTATION TRANSCRIPT: Read this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

Splunk

Top Tips for Collecting, Storing, and Analyzing Operations Log Data
sponsored by Hewlett Packard Enterprise
WEBCAST: View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

The Need for Profitability and Cost Management
sponsored by Oracle Corporation
WHITE PAPER: As indirect costs rise and economic pressures increase, the need for profitability and cost management (PCM) also grows. Read this white paper to find out more about how PCM drives business performance by finding drivers of cost and profitability, empowering users with visibility and flexibility, and improving resource alignment.
Posted: 14 Sep 2009 | Published: 01 Sep 2008

Oracle Corporation

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change
sponsored by Lumension
WHITE PAPER: Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Posted: 12 Aug 2009 | Published: 01 Sep 2008

Lumension
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences