IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Data governance (DG) refers to the overall management of the availability, usability, integrity, and security of the data employed in an enterprise. A sound data governance program includes a governing body or council, a defined set of procedures, and a plan to execute those procedures.The initial step in the implementation of a data governance program involves defining the owners or custodians of  … 
Definition continues below.
Data GovernanceWhite Papers (View All Report Types)
151 - 175 of 328 Matches Previous Page  | Next Page
IBM: An Early Leader across the Big Data Security Analytics
sponsored by IBM
WHITE PAPER: Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
Posted: 22 Jul 2013 | Published: 28 Jun 2013

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Regulatory Compliance and Operational Readiness: Complementary, But Never Synonymous
sponsored by Iron Mountain
WHITE PAPER: This resource reveals why passing audits and being able to recover are certainly complementary, but definitely not synonymous. View now to learn the difference between the two - and the regulatory compliance requirements you should be aware of - to maintain compliance in your data protection strategy.
Posted: 16 Jul 2013 | Published: 31 May 2013

Iron Mountain

The Real Cost of Bad Data: Six Simple Steps To Address Data Quality Issues
sponsored by Information Builders
WHITE PAPER: Inadequate data governance can cost millions. From regulatory fines for systems and control failures, to any other number of factors, the cost quickly adds up. View this resource to learn more about how your organization can effectively manage data quality.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

Information Builders

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 13 Jun 2013 | Published: 13 Jun 2013

Hewlett-Packard Company

Three Key Steps to Achieving Mobile Security Harmony
sponsored by Fiberlink
WHITE PAPER: In order to protect sensitive data, you'll need to take special care to ensure that you are implementing the robust controls needed to prevent both unintentional loss and malicious theft. Read this informative whitepaper in order to learn how to choose and implement data security controls effectively.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Fiberlink

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks UK
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks UK

Three Critical Decisions You Need to Make at the First Sign of a Security Breach
sponsored by Dell SecureWorks UK
WHITE PAPER: Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks UK

Identify And Influence Identity Stakeholders
sponsored by Ping Identity Corporation
WHITE PAPER: This report outlines the stakeholder needs of the Identity and Access Management playbook, breaking down the roles, responsibilities, and communication and collaboration must-dos for those who initiate and manage IAM change.
Posted: 20 May 2013 | Published: 16 Jul 2012

Ping Identity Corporation

Achieving a Single View of the Citizen With Information Management
sponsored by Information Builders
WHITE PAPER: This resource explores how creating a single view of the citizen by consolidating and synchronizing data can empower government agencies to support enhanced, information-based decision-making, improve operational performance, and more.
Posted: 03 May 2013 | Published: 31 Dec 2012

Information Builders

New Opportunities for Business Intelligence: Five Ways to Enhance Governance and Compliance for Greater Control Now
sponsored by Information Builders
WHITE PAPER: This white paper describes five innovative technology-driven solutions that can help companies to overcome the challenges in implementing and enforcing formal GRC policies and procedures.
Posted: 02 May 2013 | Published: 31 Dec 2012

Information Builders

Building a Business Case for Data Governance: Ten Critical Steps
sponsored by Information Builders
WHITE PAPER: This resource counts down 10 key steps that will help you build the business case for data governance in your organization. Also inside, learn about tools and tactics that will ensure your data governance project is a success.
Posted: 01 May 2013 | Published: 31 Dec 2012

Information Builders

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

Defending Against APTs: Do You Have the Complete Picture?
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Hexis Cyber Solutions Inc

Apache Hadoop Patterns of Use
sponsored by Hortonworks
WHITE PAPER: When it comes to Hadoop, the technology most often associated with big data, why is it so popular? Does it actually live up to the vendor hype? Check out this informative resource to get the real guidance you need to figure out where Hadoop fits into your organization, and how you can leverage it to extract the most from your big data.
Posted: 17 Jul 2013 | Published: 30 Apr 2013

Hortonworks

Oracle Information Architecture: An Architect’s Guide to Big Data
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Access this helpful resource to explore how to add big data capabilities to your mainstream information architecture, learn how to plan for the adoption of new tools from an enterprise architecture perspective, and get six best practices for big data projects.
Posted: 17 Jul 2013 | Published: 31 Aug 2012

Oracle Corporation UK Ltd

Kick-Starting Your Data Quality Program
sponsored by SearchDataManagement
WHITE PAPER: This handbook offers tips and strategies for balancing manual and automated data quality processes, building a business case for purchasing data quality tools and creating an effective data quality program.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

SearchDataManagement

Every Angle HR: Workforce Analytics made easy for SAP
sponsored by Every Angle
WHITE PAPER: SAP HR is a common tool for storing organizational and employee data, but that information isn't always easy to access. Read this helpful resource to explore an HR technology that enables user-friendly access to SAP data, so that you can make informed business decisions based on accurate information.
Posted: 10 Jul 2013 | Published: 10 Jul 2013

Every Angle

Enterprise Data Governance: The Human Element
sponsored by SAS
WHITE PAPER: This white paper explores the human element of enterprise data governance, as nearly every organizational task involving employees affects data quality. Read more to learn, through a simulated case study, how to combat people-related, data integration, organizational and cultural issues.
Posted: 02 Jul 2013 | Published: 15 Apr 2013

SAS

Apache Hadoop* Framework Spotlight: Apache Hive*
sponsored by Intel
WHITE PAPER: This brief resource examines the true value of Apache Hive, a SQL engine for the Apache Hadoop framework. Inside, learn how Hive's facilities for data and metadata management are impacting the existing warehouse infrastructure and driving business success.
Posted: 29 May 2013 | Published: 31 Mar 2013

Intel

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Harness Your Data for Better, Faster Decision-Making
sponsored by Dell Software
WHITE PAPER: In this new Dell white paper, learn about the challenges of data warehouses. Then, discover a powerful data warehouse appliance that can be quickly deployed, loads data almost immediately and helps eliminate the challenges of traditional data warehouse strategies. Download this valuable white paper today.
Posted: 10 May 2013 | Published: 10 May 2013

Dell Software

Solving the Challenges of BYOD
sponsored by SearchConsumerization.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

151 - 175 of 328 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  the data assets in the enterprise. A policy must be developed that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, and updating. Processes must be defined concerning how the data is to be stored, archived, backed up, and protected from mishaps, theft, or attack. A set of standards and procedures must be developed that defines how the data is to be used by authorized personnel. Finally, a set of controls and audit procedures must be put into place that ensures ongoing compliance with government regulations.Getting … 
Data Governance definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement