IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Data governance (DG) refers to the overall management of the availability, usability, integrity, and security of the data employed in an enterprise. A sound data governance program includes a governing body or council, a defined set of procedures, and a plan to execute those procedures.The initial step in the implementation of a data governance program involves defining the owners or custodians of  … 
Definition continues below.
Data Governance Reports
1 - 25 of 707 Matches Previous Page  |  Next Page
Preparing for the Hidden Impact of Cloud Solutions
sponsored by IBM
WHITE PAPER: Read this white paper to uncover the benefits of cloud computing. It outlines how to take a holistic approach that encompasses managing governance, organization and services.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

IBM

Intelligent Copy Data Management
sponsored by Catalogic Software
WHITE PAPER: This white paper presents a solution to the challenge of managing copy data.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

Catalogic Software

Mega Online Retailer Stores Twenty Years Worth of Data
sponsored by Catalogic Software
WHITE PAPER: This white paper describes the storage solutions and data management strategies a major online retailer chose to handle twenty years of intensive data.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

Catalogic Software

Magic Quadrant for Data Quality Tools
sponsored by Information Builders
RESOURCE: According to Gardner, by 2017 33% of Fortune 100 companies will experience an information crisis due to their inability to effectively govern and trust their enterprise information—Will you let this happen to your business?Find out how you can effectively manage your data to ensure quality analytic results with this Magic Quadrant report.
Posted: 24 Mar 2015 | Published: 26 Nov 2014

Information Builders

Self-service HR ends tyranny of the ‘print, sign, scan’ loop for Mitsubishi UFJ
sponsored by Fairsail
CASE STUDY: By switching to a single, cloud-based HR system Mitsubishi UFJ enabled individuals to fill in HR data online, allowing HR to work on more value added and productive things like talent management.This white paper describes the benefits of a single, cloud-based HR system.
Posted: 23 Mar 2015 | Published: 20 Jan 2015

Fairsail

Hadoop cluster implementations take IT teams into uncharted waters
sponsored by Rackspace
EGUIDE: In this e-guide, explore key challenges of Hadoop implementation, and gain valuable tips on how to make it a less daunting task. In 3 distinct sections learn the challenges of cluster implementation and get tips and best practices for how to successfully accomplish your goals.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Rackspace

Security First Insurance Handles Disaster Recovery with State-of-the-Art Technology for Business Insights
sponsored by IBM
CASE STUDY: To ensure your organization is effectively accessing your unstructured data check out this exclusive case study. Learn more about the challenges faced by organizations looking to leverage technology to access their content and receive recommendations for overcoming them.
Posted: 20 Mar 2015 | Published: 31 Dec 2014

IBM

How to Realize Analytics Value Faster
sponsored by Cray and Intel
WEBCAST: Join this exclusive upcoming webinar to hear expert analysts use market research to discuss the benefits of business analytics and how you can use them to improve your organization.
Posted: 20 Mar 2015 | Premieres: Apr 22, 2015

Cray and Intel

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Getting It Right From The Start: The Basics of Records Retention Schedules
sponsored by Iron Mountain
WHITE PAPER: This helpful resource helps you understand where to start when it comes to planning your records retention schedule, how it should work, and what success looks like.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Iron Mountain

6 Ways to Drive Business Value from Your RIM Program
sponsored by Iron Mountain
RESOURCE: In an attempt to take a 360° view of records information management (RIM), this brief infographic explores six ways to drive business value from your RIM program.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Iron Mountain

Data Security and Privacy: Building Confidence in Big Data
sponsored by IBM
WHITE PAPER: In order to protect big data, you need to first understand big data. This white paper will help you do so.
Posted: 16 Mar 2015 | Published: 31 Oct 2012

IBM

Bridging the data security gap
sponsored by IBM
WHITE PAPER: This white paper describes the four main areas of data security and how to approach each one.
Posted: 16 Mar 2015 | Published: 31 May 2013

IBM

Data masking everywhere
sponsored by IBM
WHITE PAPER: Read this white paper now to learn how data masking can protect your sensitive information from hackers.
Posted: 16 Mar 2015 | Published: 31 May 2014

IBM

How to Perform International Address Validation and Custom Expressions
sponsored by Melissa Data Corp
VIDEO: Access this informative webinar to learn more about the importance of data quality in the collection of international addresses. Learn the vital components of international addresses, like country, abbreviations and counties, and how you can use Contact Zone to manage and standardize your international addresses quickly and easily.
Posted: 13 Mar 2015 | Premiered: 13 Mar 2015

Melissa Data Corp

Top Five Ways Data Connectivity Accelerates Your Business
sponsored by Progress
WHITE PAPER: How can you accelerate your business with cost saving improved speed to revenue, operational excellence, simplification and performance? Access this white paper to learn how data connectivity can spur growth by using innovated cloud technology to keep costs low, and maximize operational performance. Read on to discover potential benefits.
Posted: 13 Mar 2015 | Published: 31 Dec 2014

Progress

Governing the Flow of Data Beyond the Enterprise Edge
sponsored by Axway
WHITE PAPER: In this white paper, you'll learn from technologist, business strategist, and thought leader L. Frank Kenney why traditional integration has gone by the wayside, and in its place are new, more intensive approaches to integration and governance.
Posted: 13 Mar 2015 | Published: 08 Jul 2013

Axway

The Real Costs of Bad Data
sponsored by Melissa Data Corp
WHITE PAPER: Learn more about data accuracy and the real cost of bad data in this concise white paper. Read on to learn effective strategies to combat the collection of unusable data.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Melissa Data Corp

Using Data Quality Tools and Techniques to Improve Business Value
sponsored by Melissa Data Corp
WHITE PAPER: How can you learn more about data cleansing techniques and the importance of quality data?Access this exhaustive white paper to get a full view of the complexities of data quality. Uncover the data quality tools and techniques that can improve your business' value.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Melissa Data Corp

Data protection for big data environments
sponsored by IBM
WHITE PAPER: Access this exclusive interview to learn how you can design real-time, business-driven data protection policies across your enterprise. Read on to gain more insight into big data analytics and security in six distinct sections.
Posted: 12 Mar 2015 | Published: 31 Mar 2014

IBM

Experiences from the Field - Detailed Data Security Case Study
sponsored by IBM
VIDEO: Watch this exclusive video to hear from Product Marketing integration and governance specialist, Jeff Scheepers of IBM to learn more about the new emphasis being placed on database security in today's business landscape. Continue to watch hear about industry leaders' security issues and how they were able to resolve them.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Database Vulnerability Assessment Tool: Determine the Efficacy of Your Database Protection System
sponsored by IBM
ASSESSMENT TOOL: Access this vulnerability assessment evaluation package which provides you with a simple tool that you can download for free, set up easily, and use to explore the benefits of database vulnerability assessment without the overhead of an enterprise deployment.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

IBM

The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements
sponsored by Axway
WHITE PAPER: This report divulges the results of a recent survey of executive-level IT buyers around the world regarding their ability to govern the flow of their enterprise data.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

Axway

Top Three Myths about Big Data Security
sponsored by IBM
WHITE PAPER: In this informative white paper get the top 3 myths about big data security that are preventing companies effectively securing their big data. Read on to learn how you can implement an effective big data security system to protect your valuable customer data.
Posted: 11 Mar 2015 | Published: 31 Oct 2012

IBM

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM
1 - 25 of 707 Matches Previous Page    1 2 3 4    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  the data assets in the enterprise. A policy must be developed that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, and updating. Processes must be defined concerning how the data is to be stored, archived, backed up, and protected from mishaps, theft, or attack. A set of standards and procedures must be developed that defines how the data is to be used by authorized personnel. Finally, a set of controls and audit procedures must be put into place that ensures ongoing compliance with government regulations.Getting … 
Data Governance definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement