Configuration Management

Configuration Management: The management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures and test documentation of an automated information system, throughout the development and operational life of a system. The control of changes, including the recording thereof, that are made to the hardware, software, firmware, and documentation throughout the system lifecycle.
Results 176 - 200 of 236Sort Results By: Published Date | Title | Company Name
By: CA WA 2     Published Date: Sep 29, 2008
Forrester evaluated leading Data Center Automation (DCA) solutions across approximately 80 criteria. CA was named as a leader in this Wave evaluation. The report states: “Recently, CA introduced its Data Center Automation Manager, which is part of its dynamic and virtual systems management solution and is directed at the automation of the data center.
Tags : ca wa, computer associates, forrester, data center, datacenter, data center automation, dca, network management, patch management, business process automation, configuration management
     CA WA 2
By: CA WA     Published Date: Aug 15, 2008
One of the most dramatic innovations in the infrastructure management marketplace in the last five years is the rise of Network Change and Configuration Management (NCCM) as a strategic requirement. This white paper will focus on the strong values that NCCM can bring to reliability, risk and cost management, as well as some of its powerful operational and lifecycle asset values. This report will also introduce the CA SPECTRUM Network Configuration Manager as a distinctive leadership offering.
Tags : configuration management, configuration, change management, change, network management, ca wa, computer associates, workload automation, networking, ip telephony, voice over ip
     CA WA
By: Tripwire     Published Date: Jul 25, 2008
Tripwire surveyed IT professionals to learn how virtualization is expanding and if security, change controls and compliance requirements are keeping pace. Read this white paper to learn more about the state of virtualization today and why most of the respondents agree that a dedicated configuration tool is needed and are in the process of evaluating or planning to acquire such a tool.
Tags : virtual, virtualization, tripwire, configuration, change managemement, change management, server virtualization, configuration management
     Tripwire
By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : tripwire, iso, iso 27001, security, compliance, comply, isms, information security, configuration management
     Tripwire
By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : tripwire, configuration, compliance, infrastructure, network management, configuration management
     Tripwire
By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies, security management
     Tripwire
By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern, detection, bpm, business process management, latency, soa, smartblocks, apama, correlator, event processing technical society, epts, rfid, scada
     Progress Software Corporation CEP
By: Tripwire     Published Date: Feb 25, 2008
Find out how to maintain the same level of stability and security across both virtual and physical environments, using the same software and approach.
Tags : virtual machine, virtual, virtualize, virtualized, virtualization, virtual server, configuration, configuration management, tripwire, risk management, server virtualization
     Tripwire
By: SAP     Published Date: Feb 21, 2008
Many significant business initiatives and large IT projects depend upon a successful data migration. Your goal is to minimize as much risk as possible through effective planning and scoping. This paper will provide insight into what issues are unique to data migration projects and offer advice on how to best approach them.
Tags : sap, data architect, data migration, business objects, information management software, bloor, sap r/3, application, enterprise applications, data quality management, master data management, mdm, extraction, transformation load, etl, migration, configuration management, database development, data integration, data center design and management
     SAP
By: newScale     Published Date: Jan 30, 2008
Many organizations implementing ITIL as part of their IT Service Management framework begin with the Configuration Management Database (CMDB). While a CMDB is a key piece of any successful ITIL implementation, there are several traps that are easily fallen into when implementing one.
Tags : change management, cmdb, service catalogue, service catalog, service management, itil, newscale, itil, service catalog, service catalogue, itil service catalogue, it service catalogue, it management, configuration management
     newScale
By: Tripwire     Published Date: Jan 30, 2008
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.
Tags : cmdb, change management, configuration management, risk management, compliance, idg, tripwire, lifecycle management, product lifecycle management, itil, data center design and management
     Tripwire
By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
     Absolute Software
By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor, change management, configuration management, solidcore, fortrex, security
     Solidcore
By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management, configuration management, solidcore, fortrex, infrastructure, risk management
     Solidcore
By: Solidcore     Published Date: Jan 07, 2008
Demonstrating ROI for service management investments can be difficult, especially with multi-phase deployments like ITIL that can require significant up-front investment in exchange for returns produced in the future.  Learn how setting milestones and measuring the value of each phase of an ITIL implementation can help prove the project’s value and shape its focus.
Tags : itil, roi, service, service management, solidcore, return on investment, cmdb, change management, configuration management, project management
     Solidcore
By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway, governance, infrastructure
     Tideway Systems
By: Stratavia     Published Date: Oct 03, 2007
IT organizations are looking to leverage automation to improve the delivery of business services across the enterprise, while reducing costs. Automation can be implemented in many ways; however, today’s enterprise demands a higher level of sophistication than simple scripts. This whitepaper from Stratavia discusses the key aspects of automated server provisioning that every CIO should know.
Tags : server provisioning, automation, itil, workflow, data center automation, run book automation, configuration management, configuration, data center, vmware, virtualization, stratavia, infrastructure, network management, servers, server virtualization
     Stratavia
By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : change management models, auditing, configuration management, security, change management, network security, efficiency, productivity, tripwire, cmdb, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, change control, infrastructure, business metrics
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Discover how high-performing IT organizations are able to create a culture that supports and uses change management to their advantage, facilitating enterprise business goals.
Tags : cmdb, configuration management, auditing, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, it management, change management, itil, service management
     Tripwire
By: Progress Software BTA Telecommunications     Published Date: May 14, 2007
Modern distributed, interconnected applications provide a new level of agility to businesses and IT. In these applications, the software for a business process is composed of "services," components consisting of discrete business functionality that can be recombined and reused in different business processes, enabling rapid business change. This white paper examines the challenges of, and solutions for, effectively managing their operations.
Tags : soa, itil, progress, reliability, service management, operations, operational excellence, application performance management, best practices, business activity monitoring, business management, business process management, configuration management, service oriented architecture, web service management
     Progress Software BTA Telecommunications
By: Cisco     Published Date: Feb 23, 2016
The TechWiseTV team and guest experts take an in-depth look at how industries like these are utilizing the data they are gathering from the factory floor all the way out to the field.
Tags : data management, business practices, internet, infrastructure, business intelligence, configuration management, data integration, productivity, service management
     Cisco
By: ServiceNow     Published Date: Apr 19, 2013
A robust configuration management database (CMDB) is the heart of a successful service knowledge management system. It is the faithful source of configuration details and relationships people rely on to manage services throughout their lifecycle. Like personal relationships, building and maintaining an effective CMDB is a commitment that requires care and attention to get the best value.
Tags : configuration management, database, database management, application integration, business intelligence, database security, productivity, software compliance, service management
     ServiceNow
By: CDW Vmware     Published Date: Aug 02, 2012
Following the sale of a company division housing its corporate data center, Source Interlink had to relocate core IT operations. Teaming with CDW, they were able to not only relocate, but lower capital and operating costs, reduce their carbon footprint, and increase efficiency.
Tags : data, center, optimization, cdn, interlink, operation, relocate, move, capital, operating, cost, carbon footprint, efficiency, server, virtualization, blade, servers, storage, management, power
     CDW Vmware
By: HP and Intel® Xeon® processors     Published Date: Feb 10, 2012
3cV is the combination of HP 3PAR Utility Storage with HP BladeSystem both powered by Intel® Xeon® processors and VMware virtualization solutions. Find out more now!
Tags : storage, application integration, configuration management, database development, data integration, data quality, service oriented architecture, data warehousing
     HP and Intel® Xeon® processors
By: HP and Intel® Xeon® processors     Published Date: Feb 10, 2012
In this paper sponsored by HP and Intel, we examine each of the major technologies in the Information Supply Chain that should be considered as part of an integrated strategy and then show how they interrelate.
Tags : amd, data center, tco, total cost of ownership, it organization, data center, technology decision, storage, business intelligence, configuration management, data integration, service oriented architecture
     HP and Intel® Xeon® processors
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.