IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Data governance (DG) refers to the overall management of the availability, usability, integrity, and security of the data employed in an enterprise. A sound data governance program includes a governing body or council, a defined set of procedures, and a plan to execute those procedures.The initial step in the implementation of a data governance program involves defining the owners or custodians of  … 
Definition continues below.
Data GovernanceWhite Papers (View All Report Types)
151 - 175 of 348 Matches Previous Page  | Next Page
Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

Streamline Data Protection with Tivoli Storage Manager Operations Center
sponsored by IBM
WHITE PAPER: This exclusive paper discusses a comprehensive data protection solution that enables at-a-glance monitoring and reporting, allowing admins to better utilize their resources.
Posted: 10 Sep 2013 | Published: 10 Sep 2013

IBM

The top five ways to get started with big data
sponsored by IBM
WHITE PAPER: Learn the 5 big data use cases that provide high-value starting points for your big data projects. Which technologies are designed to address these areas and how to reduce the time and cost of your projects and achieve ROI? Find out inside.
Posted: 09 Sep 2013 | Published: 30 Jun 2013

IBM

The 8 Worst Practices in Master Data Management and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: The road to a successful master data management (MDM) program can be full of detours and dead ends. In this white paper, Dan Power and Julie Hunt from Hub Designs identify the eight worst practices when planning and designing a MDM and data governance program, and show you how to get it right.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Information Builders

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

IBM: An Early Leader across the Big Data Security Analytics
sponsored by IBM
WHITE PAPER: Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
Posted: 22 Jul 2013 | Published: 28 Jun 2013

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Identity and Access Management for the Cloud
sponsored by Dell Software
WHITE PAPER: This white paper explains the access management challenge, especially as it relates to clouds, and offers best practices for overcoming the challenges involved with managing your users in both public and private clouds.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Dell Software

Top Three Mobile Application Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more!
Posted: 06 Sep 2013 | Published: 30 Nov 2012

Hewlett-Packard Limited

Deployment guide: Configuring a highly available Microsoft SQL Server 2012 environment on a Dell PowerEdge VRTX
sponsored by Dell, Inc.
WHITE PAPER: This valuable guide will walk IT and business leaders through the process of setting up a highly available Microsoft SQL Server 2012 environment using the shared infrastructure platform Dell PowerEdge VRTX.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

Dell, Inc.

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 05 Sep 2013 | Published: 05 Sep 2013

Hewlett-Packard Company

The 8 Worst Practices in MDM and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: Learn how you can keep up with the times with master data management and data governance. This resource explains how MDM is a key foundation for trusted data and more efficient business processes. Read on to find out how to improve your master data.
Posted: 04 Sep 2013 | Published: 03 Sep 2013

Information Builders

SAP predictive analysis: What you need to know
sponsored by HP
WHITE PAPER: Read on to find details about SAPs BusinessObjects Predictive Analysis, including how the NBA used HANA to help cater to stat-hungry fans.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

HP

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

The Right Remedy for Corporate Health
sponsored by Dolphin
WHITE PAPER: Check out this insightful resource to explore what you can learn from successful life sciences and healthcare companies on the subject of big data management and analytics. You'll discover a range of products that can help improve business performance and increase efficiency of core SAP applications.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

Dolphin

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

Enterprise Information Protection - The Impact of Big Data
sponsored by IBM
WHITE PAPER: In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized.
Posted: 31 Jul 2013 | Published: 31 Mar 2013

IBM

Argyle Conversation with IBM: Big Data Buzz, Less is More
sponsored by IBM
WHITE PAPER: In this informative resource, access a Q and A with the Director of Information Lifecycle Governance for IBM Worldwide, Sylvan H. Morley III, as he discusses the impact of big data on modern organizations, and gives advice on overcoming challenges to information lifecycle management.
Posted: 31 Jul 2013 | Published: 03 Jul 2013

IBM

Solution Brief: InfoSphere Optim Data Masking Solution
sponsored by IBM
WHITE PAPER: This crucial white paper examines an integrated platform for defining, integrating, protecting and managing trusted information across your systems that you can use to mask data on demand to protect privacy while ensuring security.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.
151 - 175 of 348 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  the data assets in the enterprise. A policy must be developed that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, and updating. Processes must be defined concerning how the data is to be stored, archived, backed up, and protected from mishaps, theft, or attack. A set of standards and procedures must be developed that defines how the data is to be used by authorized personnel. Finally, a set of controls and audit procedures must be put into place that ensures ongoing compliance with government regulations.Getting … 
Data Governance definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement