Data Governance Research
-
EU data protection: Essential guide
Sponsored by: TechTarget ComputerWeekly.comThe European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.
-
Cloud computing storage key management
Sponsored by: TechTarget ComputerWeekly.comJagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
Resource Center: How to Safeguard Data
Sponsored by: McAfee, Inc.This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
-
How IAM Can Address Unstructured Content Security Risks
Sponsored by: IBMIn this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
-
E-discovery Software Brings Serious ROI to Information Governance
Sponsored by: Globanet VeritasAccess this guide to examine the importance of leveraging tools like autoclassification and predictive coding for effective information governance. Additionally, you will discover approaches that improve ROI beyond just e-discovery.
-
Data Governance: Expert Q&A and Picking The Right DG Tool
Sponsored by: Globanet VeritasThis e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.
-
Hadoop Brings Affordable, Accessible Analytics to Businesses
Sponsored by: NEC Corporation of AmericaThis expert e-guide explores the history of Hadoop, starting at its inception and gazing ahead towards the uncertain future, as well as providing examples as to how Hadoop has helped enterprises with their big data analytics capabilities. Learn how Hadoop makes it feasible to process and use big data collected by companies great and small.
-
Gathering, Organizing, and Presenting Your Data
Sponsored by: NEC Corporation of AmericaIn this expert e-guide we walk you through the best way to organize and present your data, and explain how you can access large amounts of information rapidly. You'll learn how to create a collaborative data governance program, implement data visualization techniques, avoid inconsistent analysis by removing the need for data sampling, and more.
-
Information Governance: Expert Q&A, New Initiatives and Digital Drive
Sponsored by: Globanet VeritasThis e-guide contains a Q&A that discusses how compliance and information governance programs can partner up to secure the funding required to meet both their objectives. Learn about new information governance initiatives and how new tech is driving digital information governance.
-
Recovering From Ransomware Starts with a Data Protection Strategy
Sponsored by: Dell SoftwareStopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
-
How to Optimize Your Master Data Management Strategy
Sponsored by: IBMThis expert e-guide explores an integrated approach to master data management (MDM) that incorporates an enterprise data governance program. Inside, you'll find out how to optimize your data quality strategy and learn how to garner business support for your MDM initiative.
-
Cloud Services Take Off, GRC Doesn't
Sponsored by: TechTarget SecurityThe ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
-
Crafting a Data Lifecycle Management Strategy to Control Capacity
Sponsored by: Iron MountainJon Toigo, Chairman of the Data Management Institute, explains how information lifecycle management (ILM) strategies can help classify data and control capacity by allocating it to the appropriate storage. Discover how recent improvements in ILM can enable your enterprise to truly benefit from implementing this strategy.
-
The Big Data Surge: Data Modeling Challenges & Best Practices for Prepping Big Data Apps for Production
Sponsored by: IBMSurging big data is changing data modeling techniques and app development cycles. Read on to discover what you should expect from big data's near-future and best practices when it comes to transitioning big data applications into the production stage.
-
Piecing Together a Clearly Defined API Management Strategy
Sponsored by: TechTarget App ArchitectureAs businesses develop a greater reliance on APIs, they need to recognize the importance of creating a simple, all-inclusive API management strategy.
-
Office 365: Cloud Data Security Considerations to Explore Before Adopting
Sponsored by: ProofpointIT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
-
DLP Tools Essential to Data Protection Strategy
Sponsored by: Intel SecurityNetwork-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
-
Six Steps to Buying Data Loss Prevention Products
Sponsored by: Intel SecurityData loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
-
An Effective Data Archiving System Can Ease Backup Woes
Sponsored by: VeritasThis e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
-
Yield Insight into Your Business Info with Data-Aware Storage
Sponsored by: DataGravityThis expert guide discusses advanced "data-aware" storage infrastructure with big data processing capabilities and efficient metadata management. Learn how this infrastructure can provide your enterprise with intelligent, fast, and highly efficient data services that enables greater insight into your stored data.
-
Making the Case for Data-Aware Storage
Sponsored by: DataGravityThis e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
-
Compliance Standards for Data Governance
Sponsored by: SmarshThis e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
-
Tips and Tricks To Keep In Mind When Adopting A Hybrid Cloud Strategy
Sponsored by: SimpliVityMany small to medium-sized businesses have moved parts of their infrastructure to the cloud, but larger organizations have been slower to adopt this strategy because they already have an infrastructure in place. This e-guide details how the hybrid cloud allows these organizations to leverage their on-premises infrastructure as well as the cloud.
-
How an Identity Management System can Improve Mobile Security
Sponsored by: Oracle CorporationThis e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.
-
A Case for IT Security: The Future of New EU Data Protection
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.