Management What ConfigurationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Management What Configurations returned the following results.
RSS What is RSS?
Related Categories

 •   Change and Configuration Management
 •   Software Configuration Management (SCM)
 •   Data Security
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Business Process Management (BPM)
 •   Network Management
 •   Testing and Analysis
 •   Vulnerability Assessment
 •   Network Security

Related Searches
 •   Cycles Management What Configurations
 •   Display Management What Configurations
 •   Guideline Management What Configurations
 •   Management Schedule
 •   Management What Configurations Summary
 •   Management What Networking
 •   Objectives Management What
 •   Source Management What Configurations
 •   Tools Management What Configurations
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution by McAfee, Inc.

August 18, 2011 - (Free Research)
This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more. 
(WHITE PAPER) READ ABSTRACT |

Performance Management: What the Mid-Market Can Learn from Large Enterprises by SAP America, Inc.

January 27, 2012 - (Free Research)
This white paper features results from a study by Aberdeen Group on mid-sized (or mid-market) organization on performance management. 
(ANALYST REPORT) READ ABSTRACT |

The State of Requirement Management - 2011 by Jama Software

August 18, 2011 - (Free Research)
If you're involved in the planning and development of products, software applications or systems, this report is for you. Learn the results of a recent industry survey - get insight on the latest trends, challenges and solutions and learn what development teams are doing to successfully plan and develop new products in a customer-driven economy. 
(WHITE PAPER) READ ABSTRACT |

Identity-Aware Networking by Extreme Networks (E-mail this company)

December 02, 2010 - (Free Research)
When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications. 
(WHITE PAPER) READ ABSTRACT |

Get More Out of Your SAP Workflow Application by SearchSAP

February 25, 2013 - (Free Research)
Let this E-Book be your guide to expanding business possibilities with SAP Workflow add-ons. Discover how add-ons can help your business process management, what add-ons exist for SAP mobile, seven questions to ask when evaluating add-ons, and more. 
(EBOOK) READ ABSTRACT |

Securing Data Stored on Tape with Encryption by Quantum Corporation

April 30, 2010 - (Free Research)
Considering company data needs to be stored for longer periods of time and the high cost of a data breach; the need to encrypt data stored on tape is becoming increasingly important. Read this paper now to learn about why companies are moving in this direction, and what technologies are out there to help. 
(IT BRIEFING) READ ABSTRACT |

Protect Your Brand By Improving Quality And Compliance by Apriso Corporation

May 13, 2011 - (Free Research)
Today's businesses need to make their brand unique-- but with all the challenges they face regarding supply chain management, what is the solution? 
(WHITE PAPER) READ ABSTRACT |

Configuration Assessment: Choosing the Right Solution by Tripwire, Inc.

July 2008 - (Free Research)
Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits. 
(WHITE PAPER) READ ABSTRACT |

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability by Tripwire, Inc.

July 2008 - (Free Research)
Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization. 
(WHITE PAPER) READ ABSTRACT |

10 Obvious Statements about Software Configuration and Change Management (And What They Mean For Your Organization) by Remain Software

April 2009 - (Free Research)
This document will explore 10 important aspects that should be considered before proceeding with the implementation of a specific solution. 
(WHITE PAPER) READ ABSTRACT |

Orion Network Configuration Manager (NCM) by SolarWinds, Inc.

July 2009 - (Free Research)
Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies. 
(TRIAL SOFTWARE) READ ABSTRACT |

Protect, Detect, and Correct: What's New in Tripwire Enterprise 8 by Tripwire, Inc.

February 2011 - (Free Research)
Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine. 
(DATA SHEET) READ ABSTRACT |

Network Configuration & Change Management for Dummies by EMC

June 2011 - (Free Research)
This easy-to-read guide details what’s going on with network configuration and change management (NCCM), and why efficient and effective handling of related processes is so important to The IT organization and end users—in enterprises, large-scale organizations, and even service providers. 
(WHITE PAPER) READ ABSTRACT |

Agile ALM Q & A by Arrow and HP

December 2010 - (Free Research)
From this interview with Michael Hüttermann, readers will learn how software configuration management (SCM) ties in with application lifecycle management (ALM) tools, what exactly constitutes an agile ALM tool, what automation means in an agile ALM context, and finally, tradeoffs between flexibility and configurability. 
(EGUIDE) READ ABSTRACT |

Virtual Data Center E-Zine - Volume 12 by Virtual Data Center E-Zine - Volume 12

July 2009 - (Free Research)
Virtualization has changed the concept of configuration management in data centers. In this month's issue, find out what to look for when shopping for the perfect configuration management tool. Virtualization has also had an impact on system security. Learn how to keep your virtual environment safe. 
(EZINE)

Best Practice for NDMP Backup Veritas NetBackup by Symantec Corporation

January 2009 - (Free Research)
Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Making Time for Endpoint Security by BigFix

November 2010 - (Free Research)
This presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Data Sheet: What's New in Red Hat Satellite 5.6? by Red Hat

October 2013 - (Free Research)
Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs. 
(WHITE PAPER) READ ABSTRACT |

What Changed? Leveraging the Power of Change Auditing by Tripwire, Inc.

December 2008 - (Free Research)
Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed. 
(PRODUCT OVERVIEW) READ ABSTRACT |

ALM and Agile Strategies Issue 2 by CA Technologies.

April 2012 - (Free Research)
Application lifecycle management (ALM) is what keeps the latest software tools working, and Agile ALM provides transparency and improved communications between teams and stakeholders. This exclusive e-zine discusses the latest collaboration tools for ALM and software configuration management (SCM). 
(EZINE) READ ABSTRACT |

Presentation Transcript: Hyper-V vs. Market Leaders by Dell and Microsoft

November 2010 - (Free Research)
In this transcript, senior enterprise IT architect Nelson Ruest breaks down VMware ESX Server, Citrix XenServer and Hyper-V, providing details on what each product has to offer. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Hyper-V vs. Market Leaders by Dell and Microsoft

March 2009 - (Free Research)
In this transcript, senior enterprise IT architect Nelson Ruest breaks down VMware ESX Server, Citrix XenServer and Hyper-V, providing details on what each product has to offer. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Collaborative IT: A Pragmatic Approach for Bringing the Service Desk and Operations Together by Hewlett-Packard Company

July 2010 - (Free Research)
This reports looks at best practices and technologies that can support an effective integration of the Service Desk and Operations teams. The report focuses on closed loop incident and problem management, as well as end-to-end change and configuration management, with a particular focus on automation. 
(WHITE PAPER) READ ABSTRACT |

Configuration Auditing – The Next Critical Step in Compliance by nCircle

August 2010 - (Free Research)
In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine September 2011—Reader’s Choice Awards by Information Security Magazine

September 2011 - (Free Research)
Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access. 
(EZINE)

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts