IT Management  >   Systems Operations  >   Data Management  >  

Data Classification

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Categorization
DEFINITION: The categorization of stored data for its most effective and efficient use. Data can be classified according to its critical value or how often it needs to be accessed, with the most critical or often-used data stored on the fastest media while other data can be stored on slower (and less expensive) media.
Data ClassificationReports
1 - 25 of 66 Matches Previous Page  | Next Page
Analyst Report: Rethinking Data Discovery And Data Classification
sponsored by IBM
WHITE PAPER: Security pros can't adequately protect data if they don't have knowledge about what data exists, where it resides, its value to the organization, and who can use it. In this Forrester Research, Inc. report, discover a data security and control framework that will help you adapt to the new data economy.
Posted: 29 Oct 2014 | Published: 01 Oct 2014

IBM

Red Hat Consulting: Data Virtualization
sponsored by Red Hat
WHITE PAPER: View this whitepaper to discover one solution that helps virtualize and centralize your information, and tunes systems to take advantage of a single view of multiple sources.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Red Hat

Gain Control and Use All of Your Data Securely with Data Virtualization
sponsored by Red Hat
WEBCAST: Companies rely heavily on data gathering and analysis for business intelligence and predictive planning. View this webcast now to discover an in-depth discussion on data virtualization, and the advantages companies can expect.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

Red Hat

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

How to Protect Unstructured Data
sponsored by Digital Guardian
WHITE PAPER: This white paper outlines a data protection model that is used to control unstructured data by identifying and applying policy-based controls over the data's lifecycle.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper highlights the importance of using a scalable data classification program within your organization.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Data Virtualization – Flexible Technology for the Agile Enterprise
sponsored by SAS
WHITE PAPER: This paper takes a look how data virtualization technology helps keep data distribution from hampering worker productivity.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

SAS

The Future of Data Security: A Zero Trust Approach
sponsored by Digital Guardian
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

Digital Guardian

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Predictions 2014: Identity and Access Management
sponsored by IBM
ANALYST REPORT: This Gartner report reveals predictions for identity and access management (IAM) tools needed for 2014.
Posted: 17 Apr 2014 | Published: 26 Nov 2013

IBM

Governance, Risk Management and Compliance (GRC)
sponsored by ComputerWeekly.com
ANALYST REPORT: Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

CW buyer's guide: data management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A data management platform is a centralised computing system for collecting, integrating and managing large sets of structured and unstructured data from disparate sources. Effective use of such information management systems will provide access to consistent, accurate and current data.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

CW Buyer's Guide: Big Data Infrastructure
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

The Human Face of Big Data: Pulse of the Planet
sponsored by ComputerWeekly.com
BOOK: Big Data is about to radically transform our understanding of the planet, writes entrepreneur and commentator, Esther Dyson.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Mobile Data Security and Compliance Challenges in the Enterprises
sponsored by SearchSecurity.com
EGUIDE: The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

SearchSecurity.com

Reduce Costs with Streamlined Information Management
sponsored by Iron Mountain
WHITE PAPER: This white paper reveals how forward-thinking organizations are bringing their growing collection of paper and electronic records under control and realizing considerable cost savings at the same time. Read now to learn more.
Posted: 02 Sep 2012 | Published: 31 Dec 2010

Iron Mountain

Next Generation Datacentres Index –Cycle II
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Following on from the first cycle of research carried out in February 2011, this r e-run of the next generation datacentre research covered 10 regions to identify what progress organisations have made in preparing to adapt to new IT architectures and approaches to computing.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

ComputerWeekly.com

Data Protection 101: Essential Steps for Holistic Information Security
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

Converting to the Cloud and Tackling the Challenges Within
sponsored by Tenable Network Security
EGUIDE: In this expert e-guide, discover how to convert your company to the cloud. Security experts will take you through the positives and negatives of investing in the cloud and bring to light the compliance challenges that may arise when doing so.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Tenable Network Security

Extracting Business Value from Unstructured Data
sponsored by HP & Intel®
EGUIDE: Though the value of extracting intelligence from high-volume unstructured data is attractive, attempting to do so without a strategy could be disastrous for your company.  This expert-created e-guide illustrates how companies can successfully extract and analyze data to make better business decisions and reap the most benefits.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

HP & Intel®

Managing Big Data - In Small Steps
sponsored by Hitachi Data Systems
RESOURCE: Check out this quick resource to make sure you're getting real value and information out of all the data you're storing.
Posted: 28 Jun 2012 | Published: 28 Jun 2012

Hitachi Data Systems

Big Data: 8 Considerations for Choosing an Infrastructure to Hold It All
sponsored by FileTek, Inc.
EGUIDE: This expert E-Guide explores what's driving the big data movement, and cutting through vendor hype and overreaction. Read now to learn more.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

FileTek, Inc.

Oracle: Big Data for the Enterprise
sponsored by Oracle Corporation
WHITE PAPER: Oracle offers the broadest and most integrated portfolio of products to help you acquire and organize these diverse data types and analyze them alongside your existing data to find new insights and capitalize on hidden relationships. Read this white paper to learn more.
Posted: 26 Mar 2012 | Published: 31 Dec 2011

Oracle Corporation

Information Retention and eDiscovery Survey
sponsored by Symantec Corporation
WHITE PAPER: This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.
Posted: 18 Oct 2011 | Published: 17 Oct 2011

Symantec Corporation
1 - 25 of 66 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement