IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Data governance (DG) refers to the overall management of the availability, usability, integrity, and security of the data employed in an enterprise. A sound data governance program includes a governing body or council, a defined set of procedures, and a plan to execute those procedures.The initial step in the implementation of a data governance program involves defining the owners or custodians of  … 
Definition continues below.
Data GovernanceReports
226 - 250 of 649 Matches Previous Page  | Next Page
Streamline Data Protection with Tivoli Storage Manager Operations Center
sponsored by IBM
WHITE PAPER: This exclusive paper discusses a comprehensive data protection solution that enables at-a-glance monitoring and reporting, allowing admins to better utilize their resources.
Posted: 10 Sep 2013 | Published: 10 Sep 2013

IBM

Hadoop Myths Busted
sponsored by Syncsort
EGUIDE: Consult this expert e-guide today to count down 12 common Hadoop myths and misconceptions, and gain the facts you need to drive big data success.
Posted: 10 Sep 2013 | Published: 10 Sep 2013

Syncsort

The top five ways to get started with big data
sponsored by IBM
WHITE PAPER: Learn the 5 big data use cases that provide high-value starting points for your big data projects. Which technologies are designed to address these areas and how to reduce the time and cost of your projects and achieve ROI? Find out inside.
Posted: 09 Sep 2013 | Published: 30 Jun 2013

IBM

Top Three Mobile Application Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more!
Posted: 06 Sep 2013 | Published: 30 Nov 2012

Hewlett-Packard Limited

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 05 Sep 2013 | Published: 05 Sep 2013

Hewlett-Packard Company

Managing the Healthcare Data Deluge
sponsored by Iron Mountain
WEBCAST: The rapid move from paper to a digital native posture for medical records is creating a data deluge. Healthcare providers must develop a strategy to manage the healthcare information lifecycle in a manner that guarantees availability, responsiveness, and reliability of data.
Posted: 05 Sep 2013 | Premiered: Aug 26, 2013

Iron Mountain

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

The Information-Driven Enterprise: How Businesses are Fueling Success
sponsored by Hewlett-Packard Limited
ANALYST REPORT: In this report from Forrester Consulting, find the results of a survey of over 150 business technology executives regarding their journeys to smarter information management. Also inside, learn about the key role that analytics tools are playing in driving business success.
Posted: 04 Sep 2013 | Published: 30 Nov 2012

Hewlett-Packard Limited

Security Intelligence: Ensure Compliance, Optimize Performance, Boost Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

Big Data Intersection with Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explores the impact the looming intersection of big data and security analytics will have on your organization and explores why you should be looking forward to it.
Posted: 03 Sep 2013 | Premiered: Feb 28, 2013

LogRhythm, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT: This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs.
Posted: 03 Sep 2013 | Published: 07 May 2013

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Webcast: 5 Game Changing Use Cases for Big Data
sponsored by IBM
WEBCAST: This webcast counts down five essential use cases for big data that can help your organization gain a competitive advantage and fuel success. Tune in today to learn more.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

Webcast: The Newest Information Management Innovation from IBM
sponsored by IBM
WEBCAST: This valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

Webcast: IBM Information Management in the New Era of Computing
sponsored by IBM
WEBCAST: Depending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

Webcast: Drive Business Innovation: Finding Treasure in the Data Attic
sponsored by IBM
WEBCAST: This valuable webcast explains how you can go from a data strategy focused on data collection to one that drives business innovation by transforming the ways that you think about and apply data governance and architecture.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

Deployment guide: Configuring a highly available Microsoft SQL Server 2012 environment on a Dell PowerEdge VRTX
sponsored by Dell, Inc.
WHITE PAPER: This valuable guide will walk IT and business leaders through the process of setting up a highly available Microsoft SQL Server 2012 environment using the shared infrastructure platform Dell PowerEdge VRTX.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

Dell, Inc.

Webcast: Unlocking New Insights and Opportunities with Big Data
sponsored by IBM
WEBCAST: In this exclusive webcast, learn how you can use big data to create new business value, maintain relevance, and achieve greater operational efficiency.
Posted: 05 Sep 2013 | Premiered: Aug 19, 2013

IBM

The 8 Worst Practices in MDM and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: Learn how you can keep up with the times with master data management and data governance. This resource explains how MDM is a key foundation for trusted data and more efficient business processes. Read on to find out how to improve your master data.
Posted: 04 Sep 2013 | Published: 03 Sep 2013

Information Builders

Software-Defined Storage: Concept, Benefits, and Key Players
sponsored by CloudByte
EGUIDE: This e-guide explores the concept and key characteristics of software-defined storage and points out the cost and scalability benefits it can provide, particularly in virtual infrastructures.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

CloudByte

Service Management: Taking Business to the Next Level
sponsored by LabTech Software
EGUIDE: In this e-guide, gain essential knowledge of recent developments around IT services. Read on to learn why success entails more than delivering snazzy services, and why enterprise architects are working to bring SOA and master data management (MDM) efforts together.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

LabTech Software

Big Data Trends and Implications for Developers
sponsored by WANdisco
EGUIDE: Access this e-guide today to find expert strategies for streamlining and mining big data. Inside, uncover major big data trends, and learn whether Agile software development and big data are a good match.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

WANdisco

Putting Data Governance and Stewardship Into Play
sponsored by SearchDataManagement
EBOOK: For a data governance plan to be truly effective, organizations must examine key success factors for data stewardship and data governance programs. In this expert three-part handbook, learn how to ensure that data governance and stewardship plans stick in your organization.
Posted: 29 Aug 2013 | Published: 29 Aug 2013

SearchDataManagement

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®
226 - 250 of 649 Matches Previous Page    8 9 10 11 12 13    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  the data assets in the enterprise. A policy must be developed that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, and updating. Processes must be defined concerning how the data is to be stored, archived, backed up, and protected from mishaps, theft, or attack. A set of standards and procedures must be developed that defines how the data is to be used by authorized personnel. Finally, a set of controls and audit procedures must be put into place that ensures ongoing compliance with government regulations.Getting … 
Data Governance definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement