data organization

Results 1376 - 1400 of 1468Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Trillium Software     Published Date: Jun 06, 2011
The first Web seminar in the series is titled "Operational Data Quality: Get the Data Right the First Time" and will be conducted by Ed Wrazen, vice president of product marketing at Trillium Software.
Tags : 
trillium software, operational data quality, ed wrazen, operational system, business solutions, organization data quality, enterprise information
    
Trillium Software
Published By: Trillium Software     Published Date: Jun 06, 2011
The second Web seminar in the series is titled "Data Governance". Learn how Digital River successfully implemented Data Governance across their organization.
Tags : 
trillium software, operational data quality, upstream operational systems, data governance, data monitoring, businessprocesses, digital river, data management
    
Trillium Software
Published By: Trillium Software     Published Date: May 19, 2011
By implementing the six pillars of data quality optimization, your organization can incrementally improve the quality of the data that drives all your operations.
Tags : 
trillium software, data quality management, iqm, information quality management, quality maturity model, enterprise data management, edm, data storage requirements
    
Trillium Software
Published By: Trillium Software     Published Date: May 19, 2011
This report provides recommendations for improving the quality of operational data, which in turn contributes to an organization's drive toward operational excellence.
Tags : 
trillium software, tdwi checklist report, philip russom, operational data quality, opdq, analytic data, the data warehousing institute, enterprise data quality
    
Trillium Software
Published By: Riverbed     Published Date: Apr 27, 2011
One of the greatest challenges today is effectively backing up and protecting the vast amounts of data stored throughout an organization. With WAN optimization, you can accelerate network-based backup by 5x and can reduce bandwidth use by up to 95%. Download this paper and learn more about this strategy today.
Tags : 
riverbed, storage intelligence, wan optimization, backup, replication, disaster recovery, steelhead appliance, dr strategy
    
Riverbed
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper examines how states like Massachusetts have implemented one of the most stringent and far-reaching requirements for protecting consumer data and how organizations of all sizes can meet the privacy requirements with simple, scalable encryption technologies.
Tags : 
consumer privacy regulation, globalsign, biowrap, encryption solutions, wisp, compliance, personal information, security breach
    
Globalsign Inc.
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper examines how states like Massachusetts have implemented one of the most stringent requirements for protecting consumer data and how organizations of all sizes can meet the privacy requirements with simple, scalable encryption technologies.
Tags : 
consumer privacy regulation, globalsign, biowrap, encryption solutions, wisp, compliance, personal information, security breach
    
Globalsign Inc.
Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement
    
SAP
Published By: PC Mall     Published Date: Mar 21, 2011
A typical lean branch office has a significantly different server infrastructure than a data center, but despite the differences, multisite organizations have much to gain by deploying server virtualization in their branch offices.
Tags : 
server virtualization, infrastructure, data center
    
PC Mall
Published By: PC Mall     Published Date: Mar 02, 2011
A typical lean branch office has a significantly different server infrastructure than a data center, but despite the differences, multisite organizations have much to gain by deploying server virtualization in their branch offices.
Tags : 
pc mall, lean branch office, server infrastructure, data center, server virtualization
    
PC Mall
Published By: Digital Realty     Published Date: Feb 09, 2011
This paper will explore the interrelationship of data centers and virtualization, discussing the longer term impact virtualization can have on an IT organization and data center utilization.
Tags : 
digital realty trust, datacenter, virtualization, cloud computing, data center utilization
    
Digital Realty
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Published By: DataFlux     Published Date: Jan 07, 2011
This white paper explores the various methods of data integration that can help an organization find a solution that fits its specific business needs.
Tags : 
dataflux, data integration, etl, extract, transform and load, enterprise, consolidation, software-as-a-service
    
DataFlux
Published By: Revinetix, Inc.     Published Date: Nov 03, 2010
Ensuring immediate access to business critical data following a disaster event is a top priority for IT management. More organizations are replicating their backups to remote locations for disaster recovery.
Tags : 
revinetix, disaster recovery, business continuity, remote backup replication, business critical data, disk backup, remote replication
    
Revinetix, Inc.
Published By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security
Published By: IBM     Published Date: Aug 30, 2010
Proactive Data Management Controls Data Growth. To take control, organizations must begin with the conscious decision not to let data growth proceed unexamined.
Tags : 
ibm, data growth, data management
    
IBM
Published By: IBM Software     Published Date: Aug 04, 2010
New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information.
Tags : 
ibm ouncelab, data protection, c-level executive us, compliance, roi, performance, privacy, data security
    
IBM Software
Published By: SafeNet     Published Date: Jul 13, 2010
To add extra protection for confidential data while reducing the time and cost for achieving regulatory compliance, many organizations will benefit from integrating tokenization into their SafeNet solution.
Tags : 
safenet, tokenization, data protection, regulatory compliance, application integration, encryption, audit
    
SafeNet
Published By: Zynapse     Published Date: Jun 16, 2010
Data Governance has emerged as the point of convergence for people, technology and process in order to manage the crucial data (information) of an enterprise. This is a vital link in the overall ongoing data management process for it maintains the quality of data and makes it available to a wide range of decision making hierarchy across an organization
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
    
Zynapse
Published By: Pillar Data Systems     Published Date: Apr 20, 2010
In this brief 23-minute on-demand Webinar, opinion leaders from Pillar Data Systems and industry experts from featured analyst firm, Gartner, Inc., break down the challenges that today's organizations face and help them to select a flexible storage platform that will adapt to changing business and application requirements while minimizing risks and reducing management complexity.
Tags : 
pillar data systems, modern storage infrastructure, it infrastructure, productivity, tco, green it, data
    
Pillar Data Systems
Published By: Websense     Published Date: Feb 16, 2010
This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.
Tags : 
tco, websense, web security, osterman, hybrid, security solutions
    
Websense
Published By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : 
ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
    
IBM ILOG.
Start   Previous    45 46 47 48 49 50 51 52 53 54 55 56 57 58 59    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee