IT Management  >   Systems Operations  >   Data Management  >  

Data Auditing

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing (Systems Operations), Auditing, Data Audits
DEFINITION: Sampling of a data collection and measuring it against various quality characteristics, such as accuracy, completeness, validity, nonduplication or timeliness to determine its level of quality or reliability.
Data AuditingReports
1 - 25 of 43 Matches Previous Page  | Next Page
Application Archiving: Compliance Made Easy With Easily Accessible Data
sponsored by Avnet Technology Solutions
PODCAST: How can you manage every aspect of the application lifecycle, including project archiving This informative webcast discusses one solution to help companies easily and effectively handle data from applications that have been retired.
Posted: 22 Oct 2014 | Premiered: Oct 14, 2014

Avnet Technology Solutions

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Making sense of storage in a big data world
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Robert White,  executive director for enterprise infrastructure at Morgan Stanley, offers advice on how to develop a strategy for managing big data storage.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

CW Buyer's Guide: Big Data Infrastructure
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Reduce Costs with Streamlined Information Management
sponsored by Iron Mountain
WHITE PAPER: This white paper reveals how forward-thinking organizations are bringing their growing collection of paper and electronic records under control and realizing considerable cost savings at the same time. Read now to learn more.
Posted: 02 Sep 2012 | Published: 31 Dec 2010

Iron Mountain

Top benefits of compliant records management
sponsored by Iron Mountain
WHITE PAPER: When the world’s largest offshore drilling company wanted to lower the risks and costs associated with the increase of records management regulations, it sought out a qualified vendor to help create enterprise-wide compliant records management program.  Discover how this organization was able to significantly improve its records management.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

Iron Mountain

The Lowdown on Compliant Data Storage
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 10 keys to staying compliant. Learn about the importance of access and authorization controls, discover the benefits of encryption for backups, learn how to safeguard traveling media and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

#CompliantData: The Social Media Data Archiving Conundrum
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover how to set the stage for social media success with the right data backup and recovery systems. Inside, learn how to gauge risk vs. reward in social media, discover how to update your compliance strategy to include social media, receive best practices for staying on top of archiving regulations and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

CommVault Systems, Inc.

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Setting the Stage for the Data Governance: A CIO's Guide
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Big Data in Motion: Getting The Data To Where It’s Needed
sponsored by SearchSOA.com
EBOOK: Big data is great, but how do you get it all to the analytical engines? Read this white paper to learn how to start getting big data to where it's needed.
Posted: 25 Jan 2013 | Published: 31 Dec 2012

SearchSOA.com

Five Fundamental Data Quality Practices
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: This white paper is a list of five data quality practices and how they can be implemented into an organization's daily data quality processes.
Posted: 14 Sep 2011 | Published: 14 Sep 2011

Pitney Bowes Group 1 Software

SANS Institute Making Database Security an IT Security Priority
sponsored by Oracle Corporation
WHITE PAPER: Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
Posted: 13 Jun 2011 | Published: 30 Nov 2009

Oracle Corporation

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault

Meeting the True Intent of File Integrity Monitoring
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security.
Posted: 29 Oct 2010 | Published: 28 Oct 2010

Tripwire, Inc.

Presentation Transcript: Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
PRESENTATION TRANSCRIPT: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

PowerTech

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

Simplifying Log Collection, Storage and Analysis
sponsored by ArcSight, an HP Company
PRODUCT OVERVIEW: ArcSight Logger is a turnkey appliance for collection, efficient storage, and high-performance search and reporting of all enterprise log data. Read this paper to learn more details.
Posted: 29 Sep 2009 | Published: 29 Sep 2009

ArcSight, an HP Company

Kelley Blue Book Case Study
sponsored by Microsoft
CASE STUDY: In 2006, Kelley Blue Book implemented a new analytical capabilities solution based on Microsoft Business Intelligence technologies. Now Kelley Blue Book has improved sales staff efficiency and created a compelling new Web analytics product that can provide its business customers with more targeted data for their marketing efforts.
Posted: 18 Sep 2009 | Published: 31 Jul 2007

Microsoft

Improving Regulatory Compliance with Encryption
sponsored by Utimaco Safeware
WHITE PAPER: This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions.
Posted: 02 Feb 2009 | Published: 01 Feb 2007

Utimaco Safeware

Under Armour Improves Performance of SAP Data Loading with Winshuttle
sponsored by Winshuttle, LLC
CASE STUDY: Winshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

Winshuttle, LLC

Whitepaper: Control Application Data Growth Before It Controls Your Business
sponsored by IBM
WHITE PAPER: Businesses rely on ERP and CRM applications which collects information from a variety of sources to support business operations. This paper describes some ways organizations can address data growth issues through the power of enterprise data managemt.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

IBM

Database Auditing Tools and Strategies
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This paper is to introduce the current options available for database auditing and trade-offs using each.
Posted: 10 Nov 2008 | Published: 30 Oct 2008

Hexis Cyber Solutions Inc
1 - 25 of 43 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement