Change and Configuration Management White Papers

(View All Report Types)
Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Understanding ITIL® Service Portfolio Management: An Approach For Implementing Effective Service Lifecycle Management
sponsored by BMC Software, Inc.
WHITE PAPER: IT executives and their teams need a comprehensive and accurate view of IT services. A service catalog includes all relevant details about your services, including which service level agreements (SLAs) are associated with it, who is able to request it, how much it costs, and how to fulfill it. This paper describes the IT Infrastructure...
Posted: 17 Jun 2009 | Published: 15 Jun 2009

BMC Software, Inc.

ISSU: A Planned Upgrade Tool
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper describes the selection of an ISSU design, which requires a comprehensive approach that considers various permutations of redundant and non-redundant router architectures.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

Why You Should Take a Holistic Approach to ITIL and Service Support
sponsored by BMC Software, Inc.
WHITE PAPER: In these tough economic times, how do you address the challenge of reducing costs without diminishing your service quality? Companies can lower costs significantly and meet the growing demand for services by taking a more holistic approach. This paper discusses the importance of taking a unified approach to service support management and...
Posted: 18 Jun 2009 | Published: 15 Jun 2009

BMC Software, Inc.

The Shortcut Guide to Network Management for the Mid-Market
sponsored by SolarWinds, Inc.
WHITE PAPER: This 4-chapter guide was written specifically for network engineers, offering valuable insight into real-world technologies and processes for implementing centralized management and monitoring of your network infrastructure.
Posted: 16 Jul 2007 | Published: 01 Mar 2007

SolarWinds, Inc.

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Enterprise

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Longhorn Server and New Group Policy Settings
sponsored by Global Knowledge
WHITE PAPER: With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.
Posted: 14 Mar 2007 | Published: 01 Mar 2007

Global Knowledge

Practical Steps to Achieve and Maintain NERC Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.
Posted: 31 Jul 2009 | Published: 08 Dec 2008

Tripwire, Inc.