IT Management  >   Systems Operations  >   Data Management  >  

DG

RSS Feed    Add to Google    Add to My Yahoo!
DG Reports
 
How CISOs Tackle Insider Threat Data Protection
sponsored by Forcepoint
WEBCAST: Threats from within are a high priority for CISOs; even your best employees can put your data at risk. What technologies can help protect you and your employees? Hear how a real-world CISO plans, implements, and manages an insider threat program.
Posted: 30 Jun 2016 | Premiered: May 1, 2016

Forcepoint

Why Do 75% of Core Upgrades Fail?
sponsored by Infogix
EBOOK: This e-book explores 3 common core system migration pitfalls that must be addressed to prevent project failure. Discover what migration approach is the best fit for you and access 5 key considerations before undertaking your project.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

Infogix

7 Signs You Need Self-Service Reports
sponsored by Tableau Software
WHITE PAPER: Explore the use of self-service business intelligence, which equips individuals throughout your organization to investigate their own data, thereby removing some of the burden from IT. Uncover the 7 indicators that tell you when you're ready for self-service BI.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

Tableau Software

3 Steps to Create a Data Protection Lifecycle Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Discover 3 critical steps in creating a strategy for your data's lifecycle that will give you more opportunities to protect, preserve and serve your digital assets.
Posted: 15 Jul 2016 | Published: 01 Jun 2016

Iron Mountain

Data Science Roles and Industries Infographic
sponsored by IBM
RESOURCE: This infographic helps you explore how the different members of the data science team perform the necessary actions associated with analytics. Learn what roles and functions are required in a variety of industries, ranging from education to banking and finance, in order to fully leverage data and analytics.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

IBM

4 Cybersecurity Trends that Might Be Affecting Your Organization
sponsored by Navex Global
ANALYST REPORT: In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.
Posted: 13 Jul 2016 | Published: 04 May 2016

Navex Global

Data Refinement: Facilitating the data-driven organization
sponsored by IBM
WHITE PAPER: Packed with findings from architecture and app development pros, this Forrester Research report will help development and IT teams better understand why a good data refinement strategy is a business imperative, why architects and developers don't' see data the same way, where the hybrid cloud fits in when defining data refinement success, and more.
Posted: 22 Jun 2016 | Published: 30 Jun 2015

IBM

From Data to Action: Your Guide to Analytics
sponsored by Intel Corporation
ANALYST REPORT: You've followed the big data trend and collected more data than you may need—now what? In this comprehensive guide to analytics, learn everything from using data to propel your business forward, to extracting value from almost any analytics project, to securing big data.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Intel Corporation

How Financial Firms Can Improve Data Quality: Learn From The Experts
sponsored by Trillium Software
WHITE PAPER: In this white paper, a roundtable of 10 industry experts weigh in on the ways financial firms can improve data quality. Learn more about IT's role in assessing data quality and what these experts recommend for best practices.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

Trillium Software

Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
DG White Papers | DG Multimedia | DG IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement