IT Management  >   Systems Operations  >   Data Management  >  

Data Classification

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Categorization
DEFINITION: The categorization of stored data for its most effective and efficient use. Data can be classified according to its critical value or how often it needs to be accessed, with the most critical or often-used data stored on the fastest media while other data can be stored on slower (and less expensive) media.
Data Classification Reports
1 - 25 of 66 Matches Previous Page  |  Next Page
Information Availability: Solve Your Top 3 Challenges
sponsored by Commvault
WHITE PAPER: This white paper discusses how you can more strategically manage your data by assessing how much of it can be useful, and how to get more from the data that is.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Commvault

The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

Four Steps to a Proactive Big Data Security Strategy
sponsored by IBM
WHITE PAPER: This white paper introduces four essential steps to proactively securing all the data in your enterprise.
Posted: 17 Aug 2015 | Published: 30 Jun 2014

IBM

Challenges of Unstructured Data
sponsored by Basho Technologies
WHITE PAPER: This white paper provides helpful advice and tips on how you use unstructured data to your advantage.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Basho Technologies

Simplify Migration for All Your Data
sponsored by Catalogic Software
WHITE PAPER: In this white paper, discover a simplified method of clustered data migration.
Posted: 26 Mar 2015 | Published: 26 Mar 2015

Catalogic Software

Data Virtualization Done Right
sponsored by Red Hat
WHITE PAPER: View this whitepaper to discover one solution that helps virtualize and centralize your information, and tunes systems to take advantage of a single view of multiple sources.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Red Hat

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper gives you a detailed look at how to stop the chain of attack in a data breach.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper can help you easily focus your security on your most sensitive data by providing guidelines to effective data classification.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

The Future of Data Security: A Zero Trust Approach
sponsored by IBM
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

IBM

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Governance, Risk Management and Compliance (GRC)
sponsored by ComputerWeekly.com
ANALYST REPORT: Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

CW buyer's guide: data management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A data management platform is a centralised computing system for collecting, integrating and managing large sets of structured and unstructured data from disparate sources. Effective use of such information management systems will provide access to consistent, accurate and current data.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

CW Buyer's Guide: Big Data Infrastructure
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

The Human Face of Big Data: Pulse of the Planet
sponsored by ComputerWeekly.com
BOOK: Big Data is about to radically transform our understanding of the planet, writes entrepreneur and commentator, Esther Dyson.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Mobile Data Security and Compliance Challenges in the Enterprises
sponsored by SearchSecurity.com
EGUIDE: The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

SearchSecurity.com

Next Generation Datacentres Index –Cycle II
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Following on from the first cycle of research carried out in February 2011, this r e-run of the next generation datacentre research covered 10 regions to identify what progress organisations have made in preparing to adapt to new IT architectures and approaches to computing.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

ComputerWeekly.com

Data Protection 101: Essential Steps for Holistic Information Security
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

Buyer's Essentials: What to look for in User Behavioral Analytics
sponsored by SearchSecurity.com
EBOOK: This guide helps InfoSec pros considering a user behavioral analytics tool purchase. It reviews key features, deployment strategies and reasonable performance expectations.
Posted: 21 May 2015 | Published: 21 May 2015

SearchSecurity.com

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Converting to the Cloud and Tackling the Challenges Within
sponsored by Tenable Network Security
EGUIDE: In this expert e-guide, discover how to convert your company to the cloud. Security experts will take you through the positives and negatives of investing in the cloud and bring to light the compliance challenges that may arise when doing so.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Tenable Network Security

Extracting Business Value from Unstructured Data
sponsored by HP & Intel®
EGUIDE: Though the value of extracting intelligence from high-volume unstructured data is attractive, attempting to do so without a strategy could be disastrous for your company.  This expert-created e-guide illustrates how companies can successfully extract and analyze data to make better business decisions and reap the most benefits.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

HP & Intel®

Managing Big Data - In Small Steps
sponsored by Hitachi Data Systems
RESOURCE: Check out this quick resource to make sure you're getting real value and information out of all the data you're storing.
Posted: 28 Jun 2012 | Published: 28 Jun 2012

Hitachi Data Systems

Big Data: 8 Considerations for Choosing an Infrastructure to Hold It All
sponsored by FileTek, Inc.
EGUIDE: This expert E-Guide explores what's driving the big data movement, and cutting through vendor hype and overreaction. Read now to learn more.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

FileTek, Inc.

Oracle: Big Data for the Enterprise
sponsored by Oracle Corporation
WHITE PAPER: Oracle offers the broadest and most integrated portfolio of products to help you acquire and organize these diverse data types and analyze them alongside your existing data to find new insights and capitalize on hidden relationships. Read this white paper to learn more.
Posted: 26 Mar 2012 | Published: 31 Dec 2011

Oracle Corporation

Information Retention and eDiscovery Survey
sponsored by Symantec Corporation
WHITE PAPER: This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.
Posted: 18 Oct 2011 | Published: 17 Oct 2011

Symantec Corporation
1 - 25 of 66 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement