ITIL V3 and Information Security
This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL
This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL
This paper introduces Gartner’s Infrastructure and Operations Maturity Model and discusses its use to enhance business value.
This report reveals how companies are taking advantage of cloud computing and provides specific steps business decision makers, IT leaders and governments must take to move forward.
This presentation provides an in-depth overview of cloud computing.
This presentation provides an introduction to NIST's cloud computing definition and their ongoing Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)
This whitepaper discusses the current rate of adoption, as well as drivers, barriers, and considerations that are influencing the adoption of cloud computing.
This presentation provides an introduction to virtualization.
This whitepaper presents a cost benefit analysis (CBA) of the IBM Computing on Demand (CoD) Cloud Offering.
This presentation defines and describes cloud computing from an information security perspective.
This white paper discusses the business drivers motivating IT buyers to consider cloud computing as an alternative to traditional dedicated IT architectures and in-house sourcing models.