Data Governance Reports

Secrets to a Successful CRM Technology Upgrade
sponsored by TechTarget Customer Experience
EBOOK: Uncover tips to ensure CRM data migrations go smoothly, and explore how proper planning, data profiling, and data quality checks can help you achieve a cost-effective CRM upgrade.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

TechTarget Customer Experience

Information Security Threats: Building Risk Resilience
sponsored by TechTarget Security
EGUIDE: Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

TechTarget Security

Every Angle HR: Workforce Analytics made easy for SAP
sponsored by Every Angle
WHITE PAPER: SAP HR is a common tool for storing organizational and employee data, but that information isn't always easy to access. Read this helpful resource to explore an HR technology that enables user-friendly access to SAP data, so that you can make informed business decisions based on accurate information.
Posted: 10 Jul 2013 | Published: 10 Jul 2013

Every Angle

Customer case Heineken Netherlands
sponsored by Every Angle
CASE STUDY: Check out this case study to learn how Heineken implemented an out-of-the-box self-service application to improve data analytics and business intelligence (BI) from SAP. Read on to discover how Heineken achieved easier access to stock overview data, service levels, lead times in the supply chain, and other benefits.
Posted: 10 Jul 2013 | Published: 10 Jul 2013

Every Angle

Graph Databases
sponsored by Neo Technology
EBOOK: Managing data that's interconnected is a common goal for businesses today, especially with the proliferation of social media data available. As such, many companies are turning to graph databases for help. Check out this comprehensive e-book to discover how graph databases can help you manage and query highly connected data.
Posted: 08 Jul 2013 | Published: 30 Jun 2013

Neo Technology

Rethink Defense-In-Depth Security Model For BYOD
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

TechTarget Security

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by TechTarget Security
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

TechTarget Security

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

CIO Handbook: Leveraging Data for Competitive Advantage
sponsored by TechTarget CIO
EGUIDE: he volume and variety of data available to companies is not only changing how some companies do business intelligence, but also transforming how they do business—period. This expert e-guide explores how big data has created the need for "data-driven" decision-making, and how companies can become data-driven even if the business wasn't born digital.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

TechTarget CIO

Big Data Security Analytics: Harnessing New Tools for Better Security
sponsored by Hexis Cyber Solutions Inc
EBOOK: New techniques are emerging to help organizations analyze security data and improve security defenses.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Hexis Cyber Solutions Inc

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE: In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Imperva

Security Big Data: Preparing for a Big Data Collection Implementation
sponsored by TechTarget Security
EBOOK: This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
Posted: 13 Jun 2013 | Published: 13 Jun 2013

TechTarget Security

Challenges With Data Protection in the Cloud
sponsored by TechTarget Security
ANALYST BRIEF: This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

TechTarget Security

How to Start Your Big Data Journey
sponsored by IBM
WEBCAST: Big data is not just about technology. It's about the value you can extract and the problems you can solve with the technology. This webcast explores five use cases that are excellent starting points for beginning the big data journey. Watch now to learn how to leverage big data technology and strategy for success.
Posted: 12 Jun 2013 | Premiered: Jun 12, 2013

IBM

Apache Hadoop* Framework Spotlight: Apache Hive* Podcast
sponsored by Intel
PODCAST: In this podcast, learn how Apache Hive is impacting the Hadoop community. Discover Hive's components and capabilities, whether Hive is a viable substitute for the existing warehouse infrastructure, the limitations of this tool, and more.
Posted: 30 May 2013 | Premiered: May 30, 2013

Intel

Apache Hadoop* Framework Spotlight: Apache Hive*
sponsored by Intel
WHITE PAPER: This brief resource examines the true value of Apache Hive, a SQL engine for the Apache Hadoop framework. Inside, learn how Hive's facilities for data and metadata management are impacting the existing warehouse infrastructure and driving business success.
Posted: 29 May 2013 | Published: 31 Mar 2013

Intel

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by OpenText Security Solutions
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

OpenText Security Solutions

Harness Your Data for Better, Faster Decision-Making
sponsored by Dell Software
WHITE PAPER: In this new Dell white paper, learn about the challenges of data warehouses. Then, discover a powerful data warehouse appliance that can be quickly deployed, loads data almost immediately and helps eliminate the challenges of traditional data warehouse strategies. Download this valuable white paper today.
Posted: 10 May 2013 | Published: 10 May 2013

Dell Software

Gartner Magic Quadrant for Unified Threat Management
sponsored by Sophos
ANALYST REPORT: Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.
Posted: 09 May 2013 | Published: 05 Mar 2012

Sophos

Understanding and Evaluating BI Options for SQL Server
sponsored by TechTarget Data Management
EBOOK: This expert handbook explores the value that SQL Server business intelligence (BI) tools can provide your organization, and evaluates your analytics options in order to help you find the approach that's best suited for your business needs.
Posted: 07 May 2013 | Published: 07 May 2013

TechTarget Data Management

Threat Detection (Antivirus Intrusion Prevention)
sponsored by TechTarget Security
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

TechTarget Security

Threat Prevention Techniques: Best Practices for Threat Management
sponsored by GeoTrust, Inc.
EGUIDE: SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.
Posted: 02 May 2013 | Published: 02 May 2013

GeoTrust, Inc.

Solving the Challenges of BYOD
sponsored by TechTarget Security
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

TechTarget Security