IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data AuditsReports
 
Top benefits of compliant records management
sponsored by Iron Mountain
WHITE PAPER: When the world’s largest offshore drilling company wanted to lower the risks and costs associated with the increase of records management regulations, it sought out a qualified vendor to help create enterprise-wide compliant records management program.  Discover how this organization was able to significantly improve its records management.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

Iron Mountain

The Lowdown on Compliant Data Storage
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 10 keys to staying compliant. Learn about the importance of access and authorization controls, discover the benefits of encryption for backups, learn how to safeguard traveling media and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

CommVault Systems, Inc.

SANS Institute Making Database Security an IT Security Priority
sponsored by Oracle Corporation
WHITE PAPER: Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
Posted: 13 Jun 2011 | Published: 30 Nov 2009

Oracle Corporation

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault

Under Armour Improves Performance of SAP Data Loading with Winshuttle
sponsored by Winshuttle, LLC
CASE STUDY: Winshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

Winshuttle, LLC

The Business Case for Data Access Governance
sponsored by Varonis
WHITE PAPER: This white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
Posted: 01 Sep 2007 | Published: 31 Aug 2007

Varonis

Preventing Data Loss: 10 Key Imperatives
sponsored by Varonis
WHITE PAPER: This white paper describes the Varonis approach to data protection, which centers on the notion of data governance -- a comprehensive means to see, control and audit all aspects of unstructured data access.
Posted: 10 Sep 2008 | Published: 01 Aug 2007

Varonis

The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere
sponsored by Imperva
PRODUCT LITERATURE: Read this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.
Posted: 24 Jul 2007 | Published: 01 Jul 2007

Imperva

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement