IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data Audits Reports
 
Information Lifecycle Governance Maturity Assessment
sponsored by IBM
RESOURCE: Increasing storage and maintenance costs, duplication of resources, the lack of trusted content, and exposure to risks and litigation are problems plaguing many enterprises today. So why are companies holding on to every bit of data? Take this assessment to determine your level of information governance maturity and see how much more you can grow.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

IBM

DataPrivilege: Entitlement Management Where It Belongs - With Business Owners
sponsored by Varonis
PRODUCT LITERATURE: In most enterprise business environments the IT personnel controls the permission settings on data; however, they are not as familiar with the information as the original data creator. Find out how you can keep data permission control in the right ...
Posted: 01 Sep 2007 | Published: 31 Aug 2007

Varonis

Data De-duplication and Replication Gives AIG Better Backups and Enhanced Sarbanes-Oxley Compliance
sponsored by Quantum Corporation
CASE STUDY: AIG major business challenge was the rapid access to archive data so to overcome this problem AIG tried Quantum backup solutions that combined data de-duplication disk, tape, due to which the company is now able to enhance compliance.
Posted: 12 Jun 2008 | Published: 01 Jun 2008

Quantum Corporation

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

Managing Unstructured Data: 10 Key Requirements
sponsored by Varonis
WHITE PAPER: This white paper takes a practical approach to identifying the right enterprise-wide data protection solution for your specific business. Learn more about these ten imperatives to know when evaluating a vendor offering.
Posted: 10 Sep 2008 | Published: 01 Aug 2007

Varonis

Improving Regulatory Compliance with Encryption
sponsored by Utimaco Safeware
WHITE PAPER: This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions.
Posted: 02 Feb 2009 | Published: 01 Feb 2007

Utimaco Safeware

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Meeting the True Intent of File Integrity Monitoring
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security.
Posted: 29 Oct 2010 | Published: 28 Oct 2010

Tripwire, Inc.

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Under Armour Improves Performance of SAP Data Loading with Winshuttle
sponsored by Winshuttle, LLC
CASE STUDY: Winshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

Winshuttle, LLC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement