IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data Audits Reports
 
Making sense of storage in a big data world
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Robert White,  executive director for enterprise infrastructure at Morgan Stanley, offers advice on how to develop a strategy for managing big data storage.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

Big Data in Motion: Getting The Data To Where It’s Needed
sponsored by SearchSOA.com
EBOOK: Big data is great, but how do you get it all to the analytical engines? Read this white paper to learn how to start getting big data to where it's needed.
Posted: 25 Jan 2013 | Published: 31 Dec 2012

SearchSOA.com

Who, What, When, Where and Why: Tracking the 5 Ws of Change in Active Directory, SharePoint, SQL Server, Exchange and VMware
sponsored by Dell Software
WHITE PAPER: This informative white paper explains the importance of visibility into your key infrastructure technologies and applications, central to most networks today.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell Software

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

DatAdvantage: Comprehensive Data Governance
sponsored by Varonis
PRODUCT LITERATURE: This paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...
Posted: 01 Sep 2007 | Published: 31 Aug 2007

Varonis

Presentation Transcript: Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
PRESENTATION TRANSCRIPT: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

PowerTech

DataPrivilege: Entitlement Management Where It Belongs - With Business Owners
sponsored by Varonis
PRODUCT LITERATURE: In most enterprise business environments the IT personnel controls the permission settings on data; however, they are not as familiar with the information as the original data creator. Find out how you can keep data permission control in the right ...
Posted: 01 Sep 2007 | Published: 31 Aug 2007

Varonis

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault

A Data Governance Manifesto: Designing & Deploying Sustainable Data Governance
sponsored by Siperian, Inc.
WHITE PAPER: Effective data governance can ensure that data is managed to align with corporate objectives and support business needs. Read this paper to learn approaches and best practices for establishing a data governance framework for your organization.
Posted: 05 Jul 2007 | Published: 01 Jun 2007

Siperian, Inc.

Preventing Data Loss: 10 Key Imperatives
sponsored by Varonis
WHITE PAPER: This white paper describes the Varonis approach to data protection, which centers on the notion of data governance -- a comprehensive means to see, control and audit all aspects of unstructured data access.
Posted: 10 Sep 2008 | Published: 01 Aug 2007

Varonis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement