Change and Configuration Management White Papers

(View All Report Types)
ITIL® v3: What It Is and Why You Should Care
sponsored by Global Knowledge
WHITE PAPER: This paper explains ITIL by describing its benefits, where it comes from, why you need to know about it, which types of IT organization can benefit from using it, and how to get started.
Posted: 14 Oct 2008 | Published: 11 Oct 2008

Global Knowledge

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Implementing an Effective Vulnerability Management Program
sponsored by Tenable
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable

SOA Solutions Using WebSphere on IBM System p5 Servers
sponsored by IBM Software Group
WHITE PAPER: This white paper explains how, by deploying SOA on top of a System p platform, you can enable innovation across your company, simplifying the complexity of the IT environment and helping reduce uncertainty around systems security and availa...
Posted: 20 Jun 2007 | Published: 01 Jul 2006

IBM Software Group

Mid-Market CEO Study
sponsored by IBM
WHITE PAPER: Explore the study, The Enterprise Of The Future: Implications For Midsize Organizations, to learn about the core traits shared by these successful midsize organizations.
Posted: 14 Jun 2010 | Published: 30 Jul 2008

IBM

Fixing the SAP Upgrade Process: Nine Best Practices
sponsored by Panaya, Inc.
WHITE PAPER: This paper takes a new look at the SAP upgrade process in light of emerging best practices and new technologies. This report offers a discussion of the value of both technical and functional upgrades as well as a discussion of some of the best practices to enhance the value of your SAP upgrades while lowering overall cost.
Posted: 10 Nov 2009 | Published: 10 Nov 2009

Panaya, Inc.

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

Better Active Directory Auditing...Less Overhead, More Power
sponsored by Netwrix Corporation
WHITE PAPER: Today’s stringent legislative and industry requirements Windows server auditing simpler, more reliable, and better able to meet their business requirements. organizations – faced with stricter internal security policies as well as– continue to struggle to make.
Posted: 20 Jul 2010 | Published: 20 Jul 2010

Netwrix Corporation

Being Agile in a Non-Agile World
sponsored by Ivar Jacobson Consulting
WHITE PAPER: This paper discusses how to implement agile thinking in the context of both defined engineering practices and an organizations' Software Development Lifecycle.
Posted: 01 Jul 2008 | Published: 01 Jun 2008

Ivar Jacobson Consulting

System Recovery-Breaking through the Dissimilar Hardware Restore Challenge
sponsored by Symantec Corporation
WHITE PAPER: This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware.
Posted: 20 Mar 2008 | Published: 01 Dec 2007

Symantec Corporation