Governance White Papers

(View All Report Types)
Governing the Business Process of Software and Systems Development
sponsored by IBM Software Group
WHITE PAPER: This white paper shows how governing the business process of software and systems development - also known as "business driven development" - will allow your organization to achieve this necessary balance between responsiveness and cont...
Posted: 14 May 2006 | Published: 01 Mar 2006

IBM Software Group

Optimize Programs and Fulfill Mandate Expectations with Project and Portfolio Governance
sponsored by Oracle Corporation
WHITE PAPER: With Oracle's Primavera Portfolio Management's enterprise approach to governance, agency executives can align projects with strategic goals, balance spending and assess risk. Plus, strategic governance provides greater levels of transparency and accountability, so compliance is never an issue and the return on taxpayer's funds is always rewarding.
Posted: 17 Oct 2013 | Published: 30 Apr 2010

Oracle Corporation

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

BTS Consultant Thought Leadership Paper: Business Case for Value Realization Business Case for Value Realization During Implementation
sponsored by SAP America, Inc.
WHITE PAPER: Find out more about value management and building value realization practices into every IT project. Discover how using value realization best practices during the lifecycle of your implementation can help you achieve greater value from your IT investments. Learn about the value of ASAP methodology and SAP offerings.
Posted: 17 May 2012 | Published: 31 Oct 2010

SAP America, Inc.

Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER: Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

The Transformational CIO
sponsored by Innotas
WHITE PAPER: This ebook presents CIOs and IT executives with a modern approach to becoming change agents and drive innovation within their organizations
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Innotas

Business Management in the Age of Enterprise 2.0
sponsored by Oracle Corporation
WHITE PAPER: In this analysis, Frank Buytendijk examines what information management means, and describes a complete spectrum of business cases, ranging from tactical cost reduction to transformational impact on the organization’s business model.
Posted: 03 Feb 2010 | Published: 01 Dec 2008

Oracle Corporation

Solution Brief: Five IT Projects for Business Agility
sponsored by IBM
WHITE PAPER: This white paper discusses taking a pro-active approach to business agility. Learn how this strategy can create "operational dexterity" to deal with changing conditions and business complexity, as well as drive innovation by encouraging growth and flexibility.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM