IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Data governance (DG) refers to the overall management of the availability, usability, integrity, and security of the data employed in an enterprise. A sound data governance program includes a governing body or council, a defined set of procedures, and a plan to execute those procedures.The initial step in the implementation of a data governance program involves defining the owners or custodians of  … 
Definition continues below.
Data GovernanceWhite Papers (View All Report Types)
126 - 150 of 332 Matches Previous Page  | Next Page
Rapid-fire Business Intelligence: The key to data success
sponsored by Tableau Software
WHITE PAPER: This resource outlines a new analytical approach that can enable your organization to see and understand data faster and more easily. Read on now to uncover the 6 key attributes of rapid-fire business intelligence (BI).
Posted: 18 Sep 2013 | Published: 28 Feb 2013

Tableau Software

Why Business Analytics in the Cloud?
sponsored by Tableau Software
WHITE PAPER: This paper will help you understand the differences between cloud and on-premise business analytics solutions and why the cloud might be the right choice, even if your data is local.
Posted: 18 Sep 2013 | Published: 18 Sep 2013

Tableau Software

Making Sense of Big Data
sponsored by Tableau Software
WHITE PAPER: This guide offers tips and tactics to help you convert your massive data volumes into actionable insight – without investing a fortune in a team of specialized data scientists. Inside, uncover the value of data visualization tools and learn how you can drive success.
Posted: 18 Sep 2013 | Published: 31 May 2013

Tableau Software

Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

Streamline Data Protection with Tivoli Storage Manager Operations Center
sponsored by IBM
WHITE PAPER: This exclusive paper discusses a comprehensive data protection solution that enables at-a-glance monitoring and reporting, allowing admins to better utilize their resources.
Posted: 10 Sep 2013 | Published: 10 Sep 2013

IBM

The top five ways to get started with big data
sponsored by IBM
WHITE PAPER: Learn the 5 big data use cases that provide high-value starting points for your big data projects. Which technologies are designed to address these areas and how to reduce the time and cost of your projects and achieve ROI? Find out inside.
Posted: 09 Sep 2013 | Published: 30 Jun 2013

IBM

Top Three Mobile Application Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more!
Posted: 06 Sep 2013 | Published: 30 Nov 2012

Hewlett-Packard Limited

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 05 Sep 2013 | Published: 05 Sep 2013

Hewlett-Packard Company

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

The 8 Worst Practices in Master Data Management and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: The road to a successful master data management (MDM) program can be full of detours and dead ends. In this white paper, Dan Power and Julie Hunt from Hub Designs identify the eight worst practices when planning and designing a MDM and data governance program, and show you how to get it right.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Information Builders

5 Pitfalls to Avoid with Hadoop
sponsored by Syncsort
WHITE PAPER: Though Hadoop has emerged as the de facto big data operating system, this tool is surrounded by myths and misconceptions. Consult this infographic today to count down five of the most common Hadoop pitfalls, and find advice for avoiding these challenges.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

Syncsort

Identity and Access Management for the Cloud
sponsored by Dell Software
WHITE PAPER: This white paper explains the access management challenge, especially as it relates to clouds, and offers best practices for overcoming the challenges involved with managing your users in both public and private clouds.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Dell Software

Deployment guide: Configuring a highly available Microsoft SQL Server 2012 environment on a Dell PowerEdge VRTX
sponsored by Dell, Inc.
WHITE PAPER: This valuable guide will walk IT and business leaders through the process of setting up a highly available Microsoft SQL Server 2012 environment using the shared infrastructure platform Dell PowerEdge VRTX.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

Dell, Inc.

The 8 Worst Practices in MDM and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: Learn how you can keep up with the times with master data management and data governance. This resource explains how MDM is a key foundation for trusted data and more efficient business processes. Read on to find out how to improve your master data.
Posted: 04 Sep 2013 | Published: 03 Sep 2013

Information Builders

SAP predictive analysis: What you need to know
sponsored by HP
WHITE PAPER: Read on to find details about SAPs BusinessObjects Predictive Analysis, including how the NBA used HANA to help cater to stat-hungry fans.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

HP

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Business Analytics for Big Data
sponsored by IBM
WHITE PAPER: Access this resource today to learn how analytics can support the use of big data in business decision-making and lead to better business outcomes. Inside, find out how you can extract big data insights, uncover the challenges of big data analytics, and more.
Posted: 21 Aug 2013 | Published: 30 Jun 2013

IBM

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

The Right Remedy for Corporate Health
sponsored by Dolphin
WHITE PAPER: Check out this insightful resource to explore what you can learn from successful life sciences and healthcare companies on the subject of big data management and analytics. You'll discover a range of products that can help improve business performance and increase efficiency of core SAP applications.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

Dolphin

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

Enterprise Information Protection - The Impact of Big Data
sponsored by IBM
WHITE PAPER: In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized.
Posted: 31 Jul 2013 | Published: 31 Mar 2013

IBM

Argyle Conversation with IBM: Big Data Buzz, Less is More
sponsored by IBM
WHITE PAPER: In this informative resource, access a Q and A with the Director of Information Lifecycle Governance for IBM Worldwide, Sylvan H. Morley III, as he discusses the impact of big data on modern organizations, and gives advice on overcoming challenges to information lifecycle management.
Posted: 31 Jul 2013 | Published: 03 Jul 2013

IBM

Solution Brief: InfoSphere Optim Data Masking Solution
sponsored by IBM
WHITE PAPER: This crucial white paper examines an integrated platform for defining, integrating, protecting and managing trusted information across your systems that you can use to mask data on demand to protect privacy while ensuring security.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM
126 - 150 of 332 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  the data assets in the enterprise. A policy must be developed that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, and updating. Processes must be defined concerning how the data is to be stored, archived, backed up, and protected from mishaps, theft, or attack. A set of standards and procedures must be developed that defines how the data is to be used by authorized personnel. Finally, a set of controls and audit procedures must be put into place that ensures ongoing compliance with government regulations.Getting … 
Data Governance definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement