Data Governance Research
-
MDM: 5 Steps to Implementing a Successful Program
Sponsored by: TrinitiCompanies will typically begin MDM efforts in one domain area before expanding to a multi-domain program model. When taking the multi-domain leap, it's critical to keep key elements in mind. In an excerpt from a MDM book, experts explain how to identify MDM domains and your master data. Plus, learn 5 steps to implementing a MDM program.
-
Business Value: The Key to Data Governance Software Selection
Sponsored by: TechTarget Data ManagementThis expert buyer's guide explores how to narrow down your choices for purchasing a data governance tool. Discover how to align business objectives with the software's capabilities and learn how to build data quality management and big data strategies into your data governance initiatives.
-
Strategies For Effective Big Data Governance And Supporting Analytics Programs
Sponsored by: IBMGoverning large and varied sets of big data is difficult. In this expert e-guide, Dr. Anne Smith, Principal Consultant at Alabama Yankee Systems, LLC reveals 7 best practices for instituting effective policies for governing sets of big data. Plus, learn how a solid data governance plan sows the seeds for a successful self-service analytics program.
-
Resource Center: How to Safeguard Data
Sponsored by: McAfee, Inc.This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
-
How IAM Can Address Unstructured Content Security Risks
Sponsored by: IBMIn this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
-
E-discovery Software Brings Serious ROI to Information Governance
Sponsored by: Globanet VeritasAccess this guide to examine the importance of leveraging tools like autoclassification and predictive coding for effective information governance. Additionally, you will discover approaches that improve ROI beyond just e-discovery.
-
Data Governance: Expert Q&A and Picking The Right DG Tool
Sponsored by: Globanet VeritasThis e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.
-
Hadoop Brings Affordable, Accessible Analytics to Businesses
Sponsored by: NEC Corporation of AmericaThis expert e-guide explores the history of Hadoop, starting at its inception and gazing ahead towards the uncertain future, as well as providing examples as to how Hadoop has helped enterprises with their big data analytics capabilities. Learn how Hadoop makes it feasible to process and use big data collected by companies great and small.
-
Gathering, Organizing, and Presenting Your Data
Sponsored by: NEC Corporation of AmericaIn this expert e-guide we walk you through the best way to organize and present your data, and explain how you can access large amounts of information rapidly. You'll learn how to create a collaborative data governance program, implement data visualization techniques, avoid inconsistent analysis by removing the need for data sampling, and more.
-
Information Governance: Expert Q&A, New Initiatives and Digital Drive
Sponsored by: Globanet VeritasThis e-guide contains a Q&A that discusses how compliance and information governance programs can partner up to secure the funding required to meet both their objectives. Learn about new information governance initiatives and how new tech is driving digital information governance.
-
Recovering From Ransomware Starts with a Data Protection Strategy
Sponsored by: Dell SoftwareStopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
-
How to Optimize Your Master Data Management Strategy
Sponsored by: IBMThis expert e-guide explores an integrated approach to master data management (MDM) that incorporates an enterprise data governance program. Inside, you'll find out how to optimize your data quality strategy and learn how to garner business support for your MDM initiative.
-
Cloud Services Take Off, GRC Doesn't
Sponsored by: TechTarget SecurityThe ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
-
Crafting a Data Lifecycle Management Strategy to Control Capacity
Sponsored by: Iron MountainJon Toigo, Chairman of the Data Management Institute, explains how information lifecycle management (ILM) strategies can help classify data and control capacity by allocating it to the appropriate storage. Discover how recent improvements in ILM can enable your enterprise to truly benefit from implementing this strategy.
-
The Big Data Surge: Data Modeling Challenges & Best Practices for Prepping Big Data Apps for Production
Sponsored by: IBMSurging big data is changing data modeling techniques and app development cycles. Read on to discover what you should expect from big data's near-future and best practices when it comes to transitioning big data applications into the production stage.
-
Piecing Together a Clearly Defined API Management Strategy
Sponsored by: TechTarget App ArchitectureAs businesses develop a greater reliance on APIs, they need to recognize the importance of creating a simple, all-inclusive API management strategy.
-
Office 365: Cloud Data Security Considerations to Explore Before Adopting
Sponsored by: ProofpointIT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
-
DLP Tools Essential to Data Protection Strategy
Sponsored by: Intel SecurityNetwork-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
-
Six Steps to Buying Data Loss Prevention Products
Sponsored by: Intel SecurityData loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
-
An Effective Data Archiving System Can Ease Backup Woes
Sponsored by: VeritasThis e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
-
Yield Insight into Your Business Info with Data-Aware Storage
Sponsored by: DataGravityThis expert guide discusses advanced "data-aware" storage infrastructure with big data processing capabilities and efficient metadata management. Learn how this infrastructure can provide your enterprise with intelligent, fast, and highly efficient data services that enables greater insight into your stored data.
-
Making the Case for Data-Aware Storage
Sponsored by: DataGravityThis e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
-
Compliance Standards for Data Governance
Sponsored by: SmarshThis e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
-
Tips and Tricks To Keep In Mind When Adopting A Hybrid Cloud Strategy
Sponsored by: SimpliVityMany small to medium-sized businesses have moved parts of their infrastructure to the cloud, but larger organizations have been slower to adopt this strategy because they already have an infrastructure in place. This e-guide details how the hybrid cloud allows these organizations to leverage their on-premises infrastructure as well as the cloud.
-
How an Identity Management System can Improve Mobile Security
Sponsored by: Oracle CorporationThis e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.