ComputerWeekly.com Research Library

Powered by Bitpipe.com

Configuration Management Research

  • Change vs. Configuration Management

    Sponsored by: Beta Systems

    Download this E-Guide to learn more about the differences – and crucial distinctions – between change management and configuration management disciplines and the important roles each one plays while building a successful IT strategy.

  • Now on Now: Our CMDB Journey

    Sponsored by: ServiceNow

    Tune in to this webinar from ServiceNow to learn best practices for deploying a highly efficient CMDB, how to harness CMDB data for more accurate risk assessments and IT reporting, and more.

  • A successful CMDB deployment in five essential steps

    Sponsored by: ServiceNow

    A healthy Configuration Management Database (CMDB) is an important precursor to a successful digital transformation strategy. Tune into the first part of this three-part series to learn how to start mastering the CI identification process, integrating multiple data sources into the CMDB, and more.

  • Smart Automation for Security Policy Management

    Sponsored by: Skybox Security

    Gartner predicts that by the end of 2020 as many as 99% of firewall breaches will be a result of misconfigurations rather than software issues. To address misconfigurations, security teams are turning to analytics-driven automation tools. Read on to learn more about their capabilities & how they can help meet your security needs.

  • 2020 Cloud Misconfigurations Report

    Sponsored by: DivvyCloud

    Across 2018 and 2019, data breaches caused by cloud misconfiguration resulted in the exposure of over 33 billion records, which led to a loss of nearly $5 trillion. In this report, explore the underlying causes of this threat and discover best practices for avoiding a misconfiguration-related incident.

  • Modern ITOps Best Practices vs. Hybrid IT

    Sponsored by: Beta Systems

    Download a copy of this expert E-Guide to learn about the latest and emerging IT ops, networking, and CMDB practices being used to tackle hybrid infrastructure management responsibilities, including a look at infrastructure-as-code (IaC) and configuration-as-code (CaC) tools.

  • Configuration Management: Addressing GRC Challenges

    Sponsored by: ServiceNow

    Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).

  • Using SAM to Build Your CMDB

    Sponsored by: ServiceNow

    Jump inside this guide to learn how to use the architecture of SAM platforms as a framework for the creation and maintenance of a CMDB – and as IT asset volume grows, how to keep it as scalable and accurate as possible.

  • Configuration Management and CMDB for Dummies

    Sponsored by: ServiceNow

    Inside this 50-page guide, learn how to build and maintain a configuration management strategy that gives your organization full view into its infrastructure – and how to give your CMDB projects wings.

  • Populate and Maintain your CMDB with ServiceNow Discovery

    Sponsored by: ServiceNow

    Inside this CMDB playbook, learn how to set up your ServiceNow Discovery environment in a way that keeps your current configuration management list up-to-date and reliable.

  • 5 Steps to Successfully Deploying a Healthy CMDB

    Sponsored by: ServiceNow

    A healthy, high-functioning CMDB doesn't happen by chance – instead, it requires some serious planning. Flip through five CMDB best practices for planning, executing, and sustaining a configuration management strategy that matches your enterprise's needs.

  • Continuous Integration and Delivery with Ansible

    Sponsored by: Red Hat

    If your team is struggling to enable continuous integration and continuous deployment (CI/CD), it may be time to consider implementing an IT automation engine. Read on here to learn about an open source automation engine that could help you enable CI/CD with zero downtime.

  • A configuration management plan needs to be a custom fit

    Sponsored by: SearchITOperations

    Choosing a configuration management tool is made especially difficult by the fact that many different vendors provide tools that do more or less the same things. Read this buyer's guide to compare product offerings such CFEngine, Puppet, Chef, Ansible, and many more.

  • Automate and Orchestrate Your IT Operations

    Sponsored by: SearchITOperations

    Even though configuration management systems are set to automate upgrades and save time, but are they right for every IT organization? This handbook examines how your IT organization should use configuration management to test new releases and automate certain tasks.

  • How Middleware Software Speeds Application Delivery

    Sponsored by: Red Hat

    This e-guide provides an in-depth Q&A session with middleware software experts Akbar Aziz and Calvin Martin about middleware automation. Learn how middleware automation speeds application delivery, simplifies configuration management, and allows microservices, containers, and cloud services to be introduced into enterprise architectures.

  • The Benefits of ITSM Principles

    Sponsored by: CDW Corporation

    In this expert e-guide, examine the various benefits that an ITSM (IT service management) approach can provide an organization. Additionally, learn advice on how to integrate configuration management and IT asset management to optimize benefits and improve performance.

  • Avoiding Audits - How to Get Of Software Vendors’ Radar

    Sponsored by: Hewlett-Packard Enterprise

    Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.

  • 10 Common Problems that Application Performance Management Helps You Solve

    Sponsored by: Riverbed Technology, Inc.

    This white paper breaks down the top ten quality and performance issues that application performance management can help to solve by detecting applications' performance problems and their causes.

  • Infographic: The Total Economic Impact of WANdisco SVN MultiSite

    Sponsored by: WANdisco

    A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.

  • Service-Oriented Configuration Management

    Sponsored by: Pangea Systems

    This whitepaper details the core functionality and key benefits of service-oriented configuration management and offers up a four-step approach for implementation.

  • Webinar: Selecting the Right SCM Tool

    Sponsored by: WANdisco

    Most SCM tools are not well-suited to support the industry trend towards WAN-based, globally distributed enterprise software development. This report and webinar will explore the reasons why these tools often struggle in a WAN environment and the key technologies for implementing solutions.

  • Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing

    Sponsored by: WANdisco

    Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.

  • Webinar: Scaling Git for the Enterprise

    Sponsored by: WANdisco

    This webinar answers the most common questions when attempting to scale Git for the enterprise including how to manage thousands of users, monitor performance, and ensure compliance with regulatory standards

  • Operational Decision Management for Dummies

    Sponsored by: IBM

    Many organizations struggle with business rules that are hidden inside applications and processes, making them difficult to change. In this e-book from the "For Dummies" series, learn how Operational Decision Management (ODM) provides a set of tools and methods to automate your business decisions for increased accuracy and effectiveness.

  • Keeping Distributed Endpoints Safe and Compliant

    Sponsored by: IBM

    Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.