IT Management  >   Systems Operations  >   Data Management  >  

Data Classification

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Categorization
DEFINITION: The categorization of stored data for its most effective and efficient use. Data can be classified according to its critical value or how often it needs to be accessed, with the most critical or often-used data stored on the fastest media while other data can be stored on slower (and less expensive) media.
Data Classification Reports
1 - 25 of 77 Matches Previous Page  |  Next Page
Rethinking Data Discovery And Data Classification
sponsored by IBM
WHITE PAPER: Many see data discovery and classification as a Sisyphean task. This Forrester report breaks down why S&R pros struggle with data discovery and security and advises how to best approach data classification moving forward.
Posted: 25 Jul 2016 | Published: 01 Oct 2014

IBM

Workforce Analytics: Context Matters
sponsored by MacroMicro
WHITE PAPER: In workforce management, context matters. Read this white paper to learn why context is king in HR, what workforce analytics means to different organizations, and how organizational mapping provides the context that you need get one consolidated view of employees.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

MacroMicro

Demo: How SuccessFactors Users Can Leverage Visual HR Organization Tools
sponsored by SAP
WEBCAST: Nothing is better at helping HR stay organized than charts. But with so many tools available, what should you consider and how do you differentiate one for another? In this demo, explore how SuccessFactors users can leverage SAP HANA Cloud Platform to gain clearer views of employees via organizational charts, get key figures and create reports.
Posted: 13 Jul 2016 | Premiered: May 19, 2016

SAP

Corporate Data Backup Expands Its Use Cases
sponsored by Veritas
EGUIDE: Products from backup software and hardware vendors have evolved to answer a broader array of challenges such as high-availability functionality, copy data management, archiving and data classification. Hear from our experts as they dive into new use cases of data backup.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

Data-driven organization design
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This extract from Data-driven Organization Design by Rupert Morrison provides a practical introduction for HR and organisation design practitioners, to using analytics to transform their organisations.
Posted: 29 Dec 2015 | Published: 29 Dec 2015

ComputerWeekly.com

5 Questions Every Human Resources Department Should Be Able to Answer
sponsored by Salesforce.com
WHITE PAPER: Key decision makers are on the hunt to uncover patterns that illuminate unforeseen trends once buried in your data. Here are the top 5 questions your HR professionals should be asking — and ways to get the answers. Access now to ensure you're getting the most out of your data.
Posted: 19 Nov 2015 | Published: 19 Nov 2015

Salesforce.com

Survey: Analytics Impact on Businesses
sponsored by Salesforce.com
WHITE PAPER: Access this report for real-world results businesses are experiencing when they tap the data available to them. Read on to see the growing role of analytics, and how to leverage such insights for actual business improvement.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

Salesforce.com

5 Ways Analytics Will Rock Your Sales
sponsored by Salesforce.com
WHITE PAPER: Access this whitepaper for 5 essential ways data can revamp your sales cycle, and how this translates to new revenue. Read on to ensure you are tapping all the resources at your disposal, and capitalizing on the proper channels for improved revenue.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

Salesforce.com

Forrester Research: Rethinking Data Discovery And Data Classification
sponsored by IBM
WHITE PAPER: This Forrester report discusses a data security and control framework that will help you keep all of your data secure, wherever it resides.
Posted: 29 Oct 2014 | Published: 01 Oct 2014

IBM

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper gives you a detailed look at how to stop the chain of attack in a data breach.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Governance, Risk Management and Compliance (GRC)
sponsored by ComputerWeekly.com
ANALYST REPORT: Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Advanced Case Management for Government
sponsored by IBM
WHITE PAPER: How can you tap into today's data growth trend to improve processes? This white paper examines the drastic explosion of data and explores how governments have begun to handle this massive influx of information.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

IBM

Essential Research Guide to Data Monetization
sponsored by GoodData
WHITE PAPER: This CITO Research guide offers an overview of the various levels of data monetization based on the experiences of those paving the way. This guide will help you understand data monetization so you can gauge your organization's readiness for taking on a data monetization strategy
Posted: 01 Dec 2015 | Published: 01 Dec 2015

GoodData

Are Curation and Preparation the Next Steps in Data Integration?
sponsored by Datawatch Corporation
WHITE PAPER: Access this expert resource to discover the most recent trends in data integration, curation, and preperation – and to learn what these trends mean for you.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Datawatch Corporation

Sterling B2B Services Reporting and Analytics
sponsored by IBM
WHITE PAPER: Access this whitepaper now to see how to provide a strategic view of your value chain, and uncover business trends in your trading partner network.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

IBM

Mission: Possible! Assessing Cognitive-Based Systems in Government
sponsored by IBM
WHITE PAPER: In this white paper, you'll learn how cognitive-based systems can help you to build knowledge, understand natural language, and provide confidence-weighted responses. Read on to see how these systems can quickly identify new patterns and insights.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

IBM

Data From Every Angle: The Power of Spatial Analytics
sponsored by Esri
WHITE PAPER: Spatial analytics is an increasingly viable way for business users to apply context in their data management process. Access this whitepaper to discover the power of considering time and place for better analysis.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

Esri

Create Value from Insights Provided by Human-Created Data
sponsored by TIBCO Software Inc.
WHITE PAPER: This white paper discusses the challenges facing companies when it comes to the analysis of unique data, like emails and chat logs. Access now to see how one system provides valuable insights from non-binary information, a key aspect of a successful future.
Posted: 03 Nov 2015 | Published: 02 Nov 2015

TIBCO Software Inc.

Foundational Methodology for Data Science
sponsored by IBM
WHITE PAPER: This white paper considers a 10 stage data science methodology that spans technologies and approaches. Access now and dive in - discover what you need to do to form an iterative process for using data to uncover insights.
Posted: 03 Nov 2015 | Published: 02 Nov 2015

IBM

Information Empowerment for Your Evolving Data Ecosystem
sponsored by IBM
WHITE PAPER: This whitepaper discusses the new features of IBM's InfoSphere Information Server V11.5, which helps you understand data and cleanse, monitor, transform, and deliver it.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

IBM

Information Availability: Solve Your Top 3 Challenges
sponsored by Commvault
WHITE PAPER: This white paper discusses how you can more strategically manage your data by assessing how much of it can be useful, and how to get more from the data that is.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Commvault

Buyer's Essentials: What to look for in User Behavioral Analytics
sponsored by SearchSecurity.com
EBOOK: This guide helps InfoSec pros considering a user behavioral analytics tool purchase. It reviews key features, deployment strategies and reasonable performance expectations.
Posted: 21 May 2015 | Published: 21 May 2015

SearchSecurity.com

Converting to the Cloud and Tackling the Challenges Within
sponsored by Tenable Network Security
EGUIDE: In this expert e-guide, discover how to convert your company to the cloud. Security experts will take you through the positives and negatives of investing in the cloud and bring to light the compliance challenges that may arise when doing so.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Tenable Network Security
1 - 25 of 77 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement