IT Management  >   Systems Operations  >   Data Management  >  

DG

RSS Feed    Add to Google    Add to My Yahoo!
DG White Papers (View All Report Types)
 
Information Security and Data Privacy Practices
sponsored by Gigya
WHITE PAPER: Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.
Posted: 18 Aug 2016 | Published: 29 Jul 2016

Gigya

The Future of Model Risk Management for Financial Services Firms
sponsored by SAS
WHITE PAPER: This white paper covers the current state of model risk management (MRM) for financial firms, as well as posits some ideas about what the future of financial modeling is going to look like. Inside you'll learn about the impact that new regulatory developments for banks has had on MRM, 5 important new features of modeling technology, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

SAS

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Report Formatting for Success with SAP BusinessObjects
sponsored by Global Knowledge
WHITE PAPER: In this white paper you will explore the finer points of report development to help you get the next level. Plus read on to get tips for creating an optical analytical experience for your businesses users.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Global Knowledge

Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Dealing with Data Sovereignty in the Cloud Era
sponsored by VMware
WHITE PAPER: This white paper examines how you can gain back control of your data in the cloud era. Learn considerations for maintaining data sovereignty and security while future proofing your cloud strategy.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

VMware

A Secure Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

Developing a Data Integration and Lifecycle Management Strategy for a Hybrid Environment
sponsored by IBM
WHITE PAPER: In this white paper, learn how you can adopt a good hybrid information governance strategy by following 4 primary priorities. Then explore the fourth priority in-depth to learn what defines an integration and lifecycle strategy.
Posted: 16 Mar 2016 | Published: 30 Apr 2015

IBM

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
DG White Papers | DG Multimedia | DG IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement