Research Library

Powered by

Information Management Research

  • Expert Analysis: 2015's Top Security Information and Event Management Vendors Compared

    Sponsored by: IBM

    The following Magic Quadrant white paper examines the top 13 security information and event management vendors. Inside, learn how each compares in terms of strengths, cautions, and more to get started on the right path to top-notch information security.

  • Contemporary Digital Information Assets Require New Look At Governance

    Sponsored by: IntraLinks, Inc

    To protect and manage constantly evolving digital information assets, modern companies must reexamine data governance and classification.

  • Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware

    Sponsored by: BlackBerry

    Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.

  • End-to-End Defensible eDiscovery

    Sponsored by: Zylab International, Inc.

    In this white paper, learn how you can condense eDiscovery processing to avoid data loss and legal consequences.

  • Big Data, Hadoop, and the Future of Information Management

    Sponsored by: IBM

    This enterprise systems journal looks at the tools and strategies emerging now to address the challenges and opportunities of big data in the enterprise. Read now to learn how your organization can manage big data effectively for the biggest impact.

  • Analyst Report: Leaders in the Secure Information Sharing Market

    Sponsored by: IntraLinks, Inc

    This white paper takes your information sharing and collaboration concerns into account and provides an extensive review of the many products and vendors available.

  • The Value of Real Time Accounting Data

    Sponsored by: Procore

    This white paper discusses how companies can speed up production and cut out excess spending by adopting collborative project management software

  • Security School: Effective Analyze SIEM Data

    Sponsored by:

    Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.

  • Salesforce Knowledge

    Sponsored by:

    The power of knowledge is often underestimated. If you can enable your service agents with the right answers at the right time, they can solve customer issues faster, increasing their productivity. Download this free datasheet to learn more.

  • Charting ECM’s Course to Enterprise Information Hub

    Sponsored by: OnBase by Hyland

    This white paper explores how using enterprise content management (ECM) as an information hub instead of a mere document repository can decrease inefficiencies and enable confident decision-making in the enterprise.

  • Achieve Data Governance and Quality With Information Management

    Sponsored by: Information Builders

    This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronized, consolidated, and shared vital citizen data.

  • Technology: The Secret to Happy (and Productive) Employees

    Sponsored by: Dell, Inc.

    Access this detailed infographic to gain insights on current trends in employer technology. Learn IT decision makers' new approaches to considering updated devices for workers, and where employees and their leaders clash.

  • Getting It Right From The Start: The Basics of Records Retention Schedules

    Sponsored by: Iron Mountain

    This helpful resource will guide you to an understanding of where to start when it comes to planning your records retention schedule, how it should work, and what success looks like. Read on to discover the advantages of a scheduling solution.

  • Information Economics: The Questions You Should Ask and The Answers Worth Knowing

    Sponsored by: Iron Mountain

    In this resource, learn how the principle of Information Economics provides a comprehensive and collaborative strategy to help organizations optimize information value and limit risk at every stage from the initial creation of records and information through their active life and secure destruction.

  • The Cost of Managing Unstructured Data

    Sponsored by: Hewlett-Packard Enterprise

    This white paper demonstrates how to calculate the typical costs for storing and managing network-attached, shared file data for a typical multisite enterprise with the use of TCO models. Read on to see how successfully calculating these costs can improve your storage management.

  • The Emergence of Governed Discovery and what it means to BI Projects

    Sponsored by: Qlik

    This white paper explores the emergence of governed discovery as a means to help join the people, processes, and technology required to enable a business to explore data freely with the utmost clarity and in a way that ensures the value and integrity of the information being manipulated.

  • BYOD Compliance: Keep Mobile Data Regulation-Ready

    Sponsored by:

    In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.

  • Digital Leeds

    Sponsored by:

    Dylan Roberts, CIO at Leeds City Council, who is directing a project on the digitisation of Leeds City Council and local government, explains his approach in this PowerPoint presentation.

  • Gartner: Digital transformation: How to survive the information crisis

    Sponsored by:

    It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.

  • IBM is a leader in the Gartner Magic Quadrant for Social Software

    Sponsored by: IBM

    This in-depth analyst report deciphers 20 different vendors in the social software market, including IBM,, and Google, and provides their strengths, cautions, and how they stack up against one another.

  • Harnessing Business-Led IT

    Sponsored by:

    CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues

  • CW Europe – August 2015

    Sponsored by:

    This issue of CW Europe investigates the different cultural attitudes towards data management ethics.

  • CW Europe – July 2015

    Sponsored by:

    The economy in central and eastern Europe (CEE) is starting to recover, which means investment in IT across the region is also starting to return. This issue of CW Europe investigates how the boost in IT is changing the role of the CIO, from supporting the business to driving its growth.

  • Best practice guide:What it takes to deliver a single view of the customer

    Sponsored by: IPL

    This white paper intends to provide the reader with insight into how to ease the burden of compliance, become more customer-centric, offer improved products and services and make better-informed decisions by creating a single view of your most important information. Access now and learn how to enable these benefits in your own business.

  • A new look at Vulnerability Management

    Sponsored by: TechTarget

    Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.