<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: The Importance of an Effective ITIL Change Management Process</title>
	<atom:link href="http://www.gfi.com/blog/importance-itil-change-management-proces/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/importance-itil-change-management-proces/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=importance-itil-change-management-proces</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Tracie Quinto</title>
		<link>http://www.gfi.com/blog/importance-itil-change-management-proces/comment-page-1/#comment-9017</link>
		<dc:creator>Tracie Quinto</dc:creator>
		<pubDate>Thu, 12 Aug 2010 07:13:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2239#comment-9017</guid>
		<description><![CDATA[@john mello

I agree with Emmanuel on this front. Although software restriction policies are no doubt a major burden with regards to both maintenance and resources, it is an essential precaution. However, it should be considered that software restriction policies should evolve just as much as the methods to skirt around them. Without an existing system for checks and balances, the company will simply  break down from the exploitive employees that work for it.]]></description>
		<content:encoded><![CDATA[<p>@john mello</p>
<p>I agree with Emmanuel on this front. Although software restriction policies are no doubt a major burden with regards to both maintenance and resources, it is an essential precaution. However, it should be considered that software restriction policies should evolve just as much as the methods to skirt around them. Without an existing system for checks and balances, the company will simply  break down from the exploitive employees that work for it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/importance-itil-change-management-proces/comment-page-1/#comment-6612</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 01 Jun 2010 09:25:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2239#comment-6612</guid>
		<description><![CDATA[Indeed enforncing software policies can be quite tricky. It is always important to remember that no matter how many controls one deploys, there is always a risk someone might find a way around it; that&#039;s why monitoring should also be considered as yet one more control. An Essential one in my opinion.]]></description>
		<content:encoded><![CDATA[<p>Indeed enforncing software policies can be quite tricky. It is always important to remember that no matter how many controls one deploys, there is always a risk someone might find a way around it; that&#8217;s why monitoring should also be considered as yet one more control. An Essential one in my opinion.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: John Mello</title>
		<link>http://www.gfi.com/blog/importance-itil-change-management-proces/comment-page-1/#comment-6582</link>
		<dc:creator>John Mello</dc:creator>
		<pubDate>Mon, 31 May 2010 15:53:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2239#comment-6582</guid>
		<description><![CDATA[Emmanuel--

Controlling what applications are installed on one&#039;s network seems like a no-brainer, but it hasn&#039;t always been embraced with open arms by system administrators. Not only can software restriction policies be time-consuming to create and maintain, they&#039;re frequently easy to circumvent by users. For example, rules based on the publisher of a program can sometimes be defeated by simply renaming a file. Hash rules need to be changed every time a program is updated. Rules limiting application launches to those located only in Windows program files may be effective if users don&#039;t have to run programs from other locations on the network, such as from a server. Those problems make the implementation of software restriction policies challenging.]]></description>
		<content:encoded><![CDATA[<p>Emmanuel&#8211;</p>
<p>Controlling what applications are installed on one&#8217;s network seems like a no-brainer, but it hasn&#8217;t always been embraced with open arms by system administrators. Not only can software restriction policies be time-consuming to create and maintain, they&#8217;re frequently easy to circumvent by users. For example, rules based on the publisher of a program can sometimes be defeated by simply renaming a file. Hash rules need to be changed every time a program is updated. Rules limiting application launches to those located only in Windows program files may be effective if users don&#8217;t have to run programs from other locations on the network, such as from a server. Those problems make the implementation of software restriction policies challenging.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:38:58 by W3 Total Cache --