ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Governance Research

  • MDM: 5 Steps to Implementing a Successful Program

    Sponsored by: Triniti

    Companies will typically begin MDM efforts in one domain area before expanding to a multi-domain program model. When taking the multi-domain leap, it's critical to keep key elements in mind. In an excerpt from a MDM book, experts explain how to identify MDM domains and your master data. Plus, learn 5 steps to implementing a MDM program.

  • Business Value: The Key to Data Governance Software Selection

    Sponsored by: TechTarget Data Management

    This expert buyer's guide explores how to narrow down your choices for purchasing a data governance tool. Discover how to align business objectives with the software's capabilities and learn how to build data quality management and big data strategies into your data governance initiatives.

  • Strategies For Effective Big Data Governance And Supporting Analytics Programs

    Sponsored by: IBM

    Governing large and varied sets of big data is difficult. In this expert e-guide, Dr. Anne Smith, Principal Consultant at Alabama Yankee Systems, LLC reveals 7 best practices for instituting effective policies for governing sets of big data. Plus, learn how a solid data governance plan sows the seeds for a successful self-service analytics program.

  • Resource Center: How to Safeguard Data

    Sponsored by: McAfee, Inc.

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • How IAM Can Address Unstructured Content Security Risks

    Sponsored by: IBM

    In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.

  • E-discovery Software Brings Serious ROI to Information Governance

    Sponsored by: Globanet Veritas

    Access this guide to examine the importance of leveraging tools like autoclassification and predictive coding for effective information governance. Additionally, you will discover approaches that improve ROI beyond just e-discovery.

  • Data Governance: Expert Q&A and Picking The Right DG Tool

    Sponsored by: Globanet Veritas

    This e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.

  • Hadoop Brings Affordable, Accessible Analytics to Businesses

    Sponsored by: NEC Corporation of America

    This expert e-guide explores the history of Hadoop, starting at its inception and gazing ahead towards the uncertain future, as well as providing examples as to how Hadoop has helped enterprises with their big data analytics capabilities. Learn how Hadoop makes it feasible to process and use big data collected by companies great and small.

  • Gathering, Organizing, and Presenting Your Data

    Sponsored by: NEC Corporation of America

    In this expert e-guide we walk you through the best way to organize and present your data, and explain how you can access large amounts of information rapidly. You'll learn how to create a collaborative data governance program, implement data visualization techniques, avoid inconsistent analysis by removing the need for data sampling, and more.

  • Information Governance: Expert Q&A, New Initiatives and Digital Drive

    Sponsored by: Globanet Veritas

    This e-guide contains a Q&A that discusses how compliance and information governance programs can partner up to secure the funding required to meet both their objectives. Learn about new information governance initiatives and how new tech is driving digital information governance.

  • Recovering From Ransomware Starts with a Data Protection Strategy

    Sponsored by: Dell Software

    Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.

  • How to Optimize Your Master Data Management Strategy

    Sponsored by: IBM

    This expert e-guide explores an integrated approach to master data management (MDM) that incorporates an enterprise data governance program. Inside, you'll find out how to optimize your data quality strategy and learn how to garner business support for your MDM initiative.

  • Cloud Services Take Off, GRC Doesn't

    Sponsored by: TechTarget Security

    The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.

  • Crafting a Data Lifecycle Management Strategy to Control Capacity

    Sponsored by: Iron Mountain

    Jon Toigo, Chairman of the Data Management Institute, explains how information lifecycle management (ILM) strategies can help classify data and control capacity by allocating it to the appropriate storage. Discover how recent improvements in ILM can enable your enterprise to truly benefit from implementing this strategy.

  • The Big Data Surge: Data Modeling Challenges & Best Practices for Prepping Big Data Apps for Production

    Sponsored by: IBM

    Surging big data is changing data modeling techniques and app development cycles. Read on to discover what you should expect from big data's near-future and best practices when it comes to transitioning big data applications into the production stage.

  • Piecing Together a Clearly Defined API Management Strategy

    Sponsored by: TechTarget App Architecture

    As businesses develop a greater reliance on APIs, they need to recognize the importance of creating a simple, all-inclusive API management strategy.

  • Office 365: Cloud Data Security Considerations to Explore Before Adopting

    Sponsored by: Proofpoint

    IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • An Effective Data Archiving System Can Ease Backup Woes

    Sponsored by: Veritas

    This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.

  • Yield Insight into Your Business Info with Data-Aware Storage

    Sponsored by: DataGravity

    This expert guide discusses advanced "data-aware" storage infrastructure with big data processing capabilities and efficient metadata management. Learn how this infrastructure can provide your enterprise with intelligent, fast, and highly efficient data services that enables greater insight into your stored data.

  • Making the Case for Data-Aware Storage

    Sponsored by: DataGravity

    This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.

  • Compliance Standards for Data Governance

    Sponsored by: Smarsh

    This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.

  • Tips and Tricks To Keep In Mind When Adopting A Hybrid Cloud Strategy

    Sponsored by: SimpliVity

    Many small to medium-sized businesses have moved parts of their infrastructure to the cloud, but larger organizations have been slower to adopt this strategy because they already have an infrastructure in place. This e-guide details how the hybrid cloud allows these organizations to leverage their on-premises infrastructure as well as the cloud.

  • How an Identity Management System can Improve Mobile Security

    Sponsored by: Oracle Corporation

    This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.