Business of Information Technology  >   Business Management  >  

IM (Information Management)

RSS Feed    Add to Google    Add to My Yahoo!
IM (Information Management) Reports
 
Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Information Governance Symposium: Information Governance Gets Its Wings... Or Does It?
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Corporate data is one of an organization's most valuable assets, making a comprehensive information governance policy vital to bottom line success. Enter this interactive, online learning environment to gain information governance advice from several industry experts.
Posted: 06 Feb 2014 | Premiered: 11 Feb 2014

SearchCompliance.com

Security Intelligence Platforms Review
sponsored by IBM
WHITE PAPER: IT professionals weigh in on SIEM options and benefits in this independently conducted study from the Ponemon Institute.
Posted: 16 Feb 2016 | Published: 28 Feb 2014

IBM

Case Study: How Waitrose Enabled Easier Collaboration and Innovation
sponsored by Cloud Sherpas
CASE STUDY: This brief case study describes the strategy that allowed a retailer to share knowledge with thousands of people instantaneously. Discover how they were able to make everyday business processes more efficient, collaborate on documents to formulate ideas in real-time, and more.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

Cloud Sherpas

Leading the Data-Driven Transformation: The CIO & The New Age of Data Quality
sponsored by Trillium Software
WHITE PAPER: Discover the top 6 challenges modern CIOs face, and explore how to leverage data quality to propel CIO success. Learn the best practices for sustainable information management strategies, allowing your CIOs to transform your business models through data-driven digitization.
Posted: 15 Aug 2016 | Published: 01 Aug 2016

Trillium Software

Crafting a Data Lifecycle Management Strategy to Control Capacity
sponsored by Iron Mountain
EGUIDE: Jon Toigo, Chairman of the Data Management Institute, explains how information lifecycle management (ILM) strategies can help classify data and control capacity by allocating it to the appropriate storage. Discover how recent improvements in ILM can enable your enterprise to truly benefit from implementing this strategy.
Posted: 08 Aug 2016 | Published: 03 Aug 2016

Iron Mountain

ECM Software Helps Overcome Content Challenges
sponsored by SearchContentManagement
EBOOK: ECM software, once limited to document management, has broadened its applications to include records management, web content management, workflow and collaboration. Learn how to evaluate ECM software to see which ones belong in your enterprise information toolkit.
Posted: 09 May 2016 | Published: 02 May 2016

SearchContentManagement

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014

TechTarget

Important Versus Vital Records: The Magic 5% You Can't Live Without
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn the steps it takes to properly identify and protect your vital records. Also gain a deeper understanding of the risks associated with inadequate preservation, how to evaluate storage options, and more.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Iron Mountain

Important Versus Vital Records: The Magic 5% You Can't Live Without
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn the steps it takes to properly identify and protect your vital records. Also gain a deeper understanding of the risks associated with inadequate preservation, how to evaluate storage options, and more.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement