IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Data governance (DG) refers to the overall management of the availability, usability, integrity, and security of the data employed in an enterprise. A sound data governance program includes a governing body or council, a defined set of procedures, and a plan to execute those procedures.The initial step in the implementation of a data governance program involves defining the owners or custodians of  … 
Definition continues below.
Data GovernanceReports
226 - 250 of 631 Matches Previous Page  | Next Page
Big Data Intersection with Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explores the impact the looming intersection of big data and security analytics will have on your organization and explores why you should be looking forward to it.
Posted: 03 Sep 2013 | Premiered: Feb 28, 2013

LogRhythm, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT: This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs.
Posted: 03 Sep 2013 | Published: 07 May 2013

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

CW buyer's guide: data management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A data management platform is a centralised computing system for collecting, integrating and managing large sets of structured and unstructured data from disparate sources. Effective use of such information management systems will provide access to consistent, accurate and current data.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

The 8 Worst Practices in Master Data Management and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: The road to a successful master data management (MDM) program can be full of detours and dead ends. In this white paper, Dan Power and Julie Hunt from Hub Designs identify the eight worst practices when planning and designing a MDM and data governance program, and show you how to get it right.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Information Builders

5 Pitfalls to Avoid with Hadoop
sponsored by Syncsort
WHITE PAPER: Though Hadoop has emerged as the de facto big data operating system, this tool is surrounded by myths and misconceptions. Consult this infographic today to count down five of the most common Hadoop pitfalls, and find advice for avoiding these challenges.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

Syncsort

Big Data in Big Companies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The International Institute for Analytics (IIA) and SAS, assess how 20 large firms have deployed analytics to generate value from their big data assets.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

ComputerWeekly.com

Privacy and Big Data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

ComputerWeekly.com

Ebook: 5 Pitfalls to Avoid with Hadoop
sponsored by Syncsort
EBOOK: This resource counts down five common Hadoop pitfalls and offers guidance to help you avoid these mistakes and maximize the value of big data.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

Syncsort

Software-Defined Storage: Concept, Benefits, and Key Players
sponsored by CloudByte
EGUIDE: This e-guide explores the concept and key characteristics of software-defined storage and points out the cost and scalability benefits it can provide, particularly in virtual infrastructures.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

CloudByte

Service Management: Taking Business to the Next Level
sponsored by LabTech Software
EGUIDE: In this e-guide, gain essential knowledge of recent developments around IT services. Read on to learn why success entails more than delivering snazzy services, and why enterprise architects are working to bring SOA and master data management (MDM) efforts together.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

LabTech Software

Big Data Trends and Implications for Developers
sponsored by WANdisco
EGUIDE: Access this e-guide today to find expert strategies for streamlining and mining big data. Inside, uncover major big data trends, and learn whether Agile software development and big data are a good match.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

WANdisco

Putting Data Governance and Stewardship Into Play
sponsored by SearchDataManagement
EBOOK: For a data governance plan to be truly effective, organizations must examine key success factors for data stewardship and data governance programs. In this expert three-part handbook, learn how to ensure that data governance and stewardship plans stick in your organization.
Posted: 29 Aug 2013 | Published: 29 Aug 2013

SearchDataManagement

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Productionizing Hadoop: Seven Architectural Best Practices
sponsored by Cisco Systems, Inc.
WEBCAST: Check out this informative resource to learn what you should consider when choosing architecture for your big data project. Discover the seven top architectural qualities of big data production platforms, and one delivery platform that automates big data workflow for more efficient, effective processing.
Posted: 28 Aug 2013 | Premiered: Aug 28, 2013

Cisco Systems, Inc.

SAP predictive analysis: What you need to know
sponsored by HP
WHITE PAPER: Read on to find details about SAPs BusinessObjects Predictive Analysis, including how the NBA used HANA to help cater to stat-hungry fans.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

HP

The Keys to Technology Business Management and Accounting Diplomacy
sponsored by Apptio
EGUIDE: Access this e-guide for an informative case study and expert insights that will help you better understand the keys to technology business management and conquer your business strives.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

Apptio

Storage Magazine: How to improve your virtual server storage setups
sponsored by IBM.
EZINE: In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.
Posted: 26 Aug 2013 | Published: 28 May 2013

IBM.

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Business Analytics for Big Data
sponsored by IBM
WHITE PAPER: Access this resource today to learn how analytics can support the use of big data in business decision-making and lead to better business outcomes. Inside, find out how you can extract big data insights, uncover the challenges of big data analytics, and more.
Posted: 21 Aug 2013 | Published: 30 Jun 2013

IBM

Big Data Business Information E-Zine
sponsored by SearchBusinessAnalytics
EZINE: With big data technology, the concentration is a little scattered. With data mining, SAP's HANA onslaught and dark data among the terms jostling for attention—there's a lot to know.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

SearchBusinessAnalytics

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation
226 - 250 of 631 Matches Previous Page    8 9 10 11 12 13    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  the data assets in the enterprise. A policy must be developed that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, completeness, and updating. Processes must be defined concerning how the data is to be stored, archived, backed up, and protected from mishaps, theft, or attack. A set of standards and procedures must be developed that defines how the data is to be used by authorized personnel. Finally, a set of controls and audit procedures must be put into place that ensures ongoing compliance with government regulations.Getting … 
Data Governance definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement