IT Management  >   Systems Operations  >   Data Management  >  

DG

RSS Feed    Add to Google    Add to My Yahoo!
DG Reports
 
Critical Capabilities for Enterprise Endpoint Backup
sponsored by Druva Software
RESOURCE: Access this in-depth analysis of endpoint backup vendors, highlighting the differences in mobile device support, performance, backup frequency, scalability, security, and more. Ease your enterprise's decision-making process in determining the right endpoint backup service for your data.
Posted: 13 May 2016 | Published: 12 Nov 2015

Druva Software

Data Refinement: Facilitating the data-driven organization
sponsored by IBM
WHITE PAPER: Packed with findings from architecture and app development pros, this Forrester Research report will help development and IT teams better understand why a good data refinement strategy is a business imperative, why architects and developers don't' see data the same way, where the hybrid cloud fits in when defining data refinement success, and more.
Posted: 22 Jun 2016 | Published: 30 Jun 2015

IBM

Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' collaboration demands are rising, making it hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014

Citrix

Data Security for the Digital Businesses
sponsored by HPE and Intel®
VIDEO: How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and Intel®

4 Reasons Your Metadata is Broken
sponsored by Tableau Software
WHITE PAPER: Learn how a new approach to metadata can fundamentally improve your business. Discover the 4 signs that your metadata is broken and find out how you can benefit from deploying self-service analytics.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Tableau Software

9 steps to build a better insider threat program
sponsored by Forcepoint
WEBCAST: While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.
Posted: 06 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

Data Science is a Team Sport. Do You Have the Skills to Be a Team Player?
sponsored by IBM
WHITE PAPER: To get the most valuable insights, quickly and reliably, successful organizations build data science teams that incorporate different skill sets and responsibilities. Learn which talents and abilities define members of a data science team, as well as how they complement each other.
Posted: 06 Jul 2016 | Published: 30 Jun 2016

IBM

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Secure file sharing in the enterprise
sponsored by Citrix
WHITE PAPER: As companies grow globally and more dispersed, file sharing becomes more critical. If an organization does not provide a solution, employees will find one -- or more -- for themselves. Access this white paper to learn about ensuring secure data sharing and a file sharing solution that solves several sharing problems.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
DG White Papers | DG Multimedia | DG IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement