IT Management  >   Systems Operations  >   Data Management  >  

Data Classification

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Categorization
DEFINITION: The categorization of stored data for its most effective and efficient use. Data can be classified according to its critical value or how often it needs to be accessed, with the most critical or often-used data stored on the fastest media while other data can be stored on slower (and less expensive) media.
Data Classification Reports
1 - 25 of 74 Matches Previous Page  |  Next Page
DLP Benefits for Enterprises and Intellectual Property Protection
sponsored by Digital Guardian
EGUIDE: This e-guide addresses some of the challenges posed by data security, with a special focus on data classification and data loss prevention.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

Digital Guardian

Comprehensive Security for Your Valuable Data
sponsored by Trustwave
WHITE PAPER: This white paper explains how you can implement strong database security that will keep the hackers out.
Posted: 01 Oct 2015 | Published: 31 Dec 2014


8 Criterias to Consider When Bringing eDiscovery In-House
sponsored by Zylab International, Inc.
WHITE PAPER: This white paper presents 8 factors to consider before pulling the trigger on bringing eDiscovery into your on-premises environment.
Posted: 25 Sep 2015 | Published: 02 Sep 2015

Zylab International, Inc.

How to Keep Your Public Cloud Private
sponsored by HyTrust
WEBCAST: In this webcast, experts address the challenges of securing data in the public cloud.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015


Prevent Critical Data Compromise
sponsored by IBM
WHITE PAPER: This white paper can help you ensure critical data never goes outside your organization with a five-step process.
Posted: 08 Sep 2015 | Published: 31 May 2015


How Do Enterprise Data Protection Platform Vendors Stack Up?
sponsored by IBM
WEBCAST: In this webcast, Vinny Choinski, Senior Lab Analyst at Enterprise Strategy Group, examines a software solution designed to protect VMware environments by transferring block-level incremental data from snapshots between virtual environments and the TSM server.
Posted: 01 Sep 2015 | Premiered: Sep 8, 2014


Hadoop for the Enterprise: Making Data Management Massively Scalable, Agile, Feature-Rich, and Cost-Effective
sponsored by IBM
WHITE PAPER: This in-depth white paper describes how Hadoop is taking on a new role in enterprises as a means of handling both data storage and analytics. Download this white paper now to learn about the top Hadoop implementation trends and best practices.
Posted: 31 Aug 2015 | Published: 31 Aug 2015


Information Availability: Solve Your Top 3 Challenges
sponsored by Commvault
WHITE PAPER: This white paper discusses how you can more strategically manage your data by assessing how much of it can be useful, and how to get more from the data that is.
Posted: 25 Aug 2015 | Published: 25 Aug 2015


The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

Challenges of Unstructured Data
sponsored by Basho Technologies
WHITE PAPER: This white paper provides helpful advice and tips on how you use unstructured data to your advantage.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Basho Technologies

How to Optimize and Integrate Data in Less Time with Fewer Errors
sponsored by Red Hat
VIDEO: Access this brief video to find out about one solution that promises to easily combine and transform data into reusable business friendly models.
Posted: 17 Dec 2014 | Premiered: 17 Dec 2014

Red Hat

Forrester Research: Rethinking Data Discovery And Data Classification
sponsored by IBM
WHITE PAPER: This Forrester report discusses a data security and control framework that will help you keep all of your data secure, wherever it resides.
Posted: 29 Oct 2014 | Published: 01 Oct 2014


Data Virtualization Done Right
sponsored by Red Hat
WHITE PAPER: View this whitepaper to discover one solution that helps virtualize and centralize your information, and tunes systems to take advantage of a single view of multiple sources.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Red Hat

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper gives you a detailed look at how to stop the chain of attack in a data breach.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper can help you easily focus your security on your most sensitive data by providing guidelines to effective data classification.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

The Future of Data Security: A Zero Trust Approach
sponsored by IBM
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014


Automating Information Governance - assuring compliance
sponsored by
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Governance, Risk Management and Compliance (GRC)
sponsored by
ANALYST REPORT: Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

CW buyer's guide: data management
sponsored by
ESSENTIAL GUIDE: A data management platform is a centralised computing system for collecting, integrating and managing large sets of structured and unstructured data from disparate sources. Effective use of such information management systems will provide access to consistent, accurate and current data.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

CW Buyer's Guide: Big Data Infrastructure
sponsored by
ESSENTIAL GUIDE: Computer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

Four Steps to a Proactive Big Data Security Strategy
sponsored by IBM
WHITE PAPER: This white paper introduces four essential steps to proactively securing all the data in your enterprise.
Posted: 17 Aug 2015 | Published: 30 Jun 2014


Buyer's Essentials: What to look for in User Behavioral Analytics
sponsored by
EBOOK: This guide helps InfoSec pros considering a user behavioral analytics tool purchase. It reviews key features, deployment strategies and reasonable performance expectations.
Posted: 21 May 2015 | Published: 21 May 2015

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

Converting to the Cloud and Tackling the Challenges Within
sponsored by Tenable Network Security
EGUIDE: In this expert e-guide, discover how to convert your company to the cloud. Security experts will take you through the positives and negatives of investing in the cloud and bring to light the compliance challenges that may arise when doing so.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Tenable Network Security

Extracting Business Value from Unstructured Data
sponsored by HP & Intel®
EGUIDE: Though the value of extracting intelligence from high-volume unstructured data is attractive, attempting to do so without a strategy could be disastrous for your company.  This expert-created e-guide illustrates how companies can successfully extract and analyze data to make better business decisions and reap the most benefits.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

HP & Intel®
1 - 25 of 74 Matches Previous Page    1 2 3    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement