Business of Information Technology  >   Business Management  >  

Information Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IM (Information Management), Info Management
DEFINITION: A method to use technology for collecting, processing and condensing information with a goal of efficient management.
Information Management Reports
201 - 225 of 573 Matches Previous Page  |  Next Page
Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013

SearchSecurity.com

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Building a Business Case for Data Governance: Ten Critical Steps
sponsored by Information Builders
WHITE PAPER: This resource counts down 10 key steps that will help you build the business case for data governance in your organization. Also inside, learn about tools and tactics that will ensure your data governance project is a success.
Posted: 01 May 2013 | Published: 31 Dec 2012

Information Builders

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

2012-2013 IT Budget Benchmark
sponsored by ComputerWeekly.com
IT BRIEFING: This in-depth research from business advisory group CEB assesses IT spending plans in 2013 based on a survey of 180 large international businesses.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

E-Guide: Bringing Value to Application Monitoring Through SIM
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Seize the power of connected intelligence
sponsored by Hewlett-Packard Limited
WEBCAST: This brief webcast demonstrates how with connected intelligence, IT leaders will be able to proactively manage information related risk, enhance customer experiences, optimize business performance, and discover new market opportunities.
Posted: 07 Sep 2012 | Premiered: Sep 7, 2012

Hewlett-Packard Limited

Are you Struggling to Manage your Healthcare Data Deluge?
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights a modern approach to health care information lifecycle management, as well as the need to team up with partners that can help deliver it. Read now to learn how to make an accurate assessment of you ILM strategy.
Posted: 21 May 2013 | Published: 21 May 2013

Iron Mountain

Information Lifecycle Governance Leader Reference Guide
sponsored by IBM
WHITE PAPER: Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

IBM

CIO Handbook: The Risk Management Approach to Information Governance
sponsored by SearchCompliance.com
EBOOK: This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.
Posted: 19 Apr 2013 | Published: 20 Mar 2013

SearchCompliance.com

Universitätsklinikum Erlangen strengthens analytics expertise and focuses on a customised healthcare analytics solution
sponsored by IBM
WHITE PAPER: View this white paper to learn how one company strengthened analytics by developing a focus on customised healthcare. It linked to relevant operational systems, how to optimise information flow and how to support the overall strategic control of the hospital at just the touch of a button.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

IBM

The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods
sponsored by Attachmate Corporation
WHITE PAPER: This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach.
Posted: 10 Apr 2013 | Published: 31 Dec 2012

Attachmate Corporation

Beyond Business as Usual: The Mega Shift Toward Social Communications
sponsored by IBM
WHITE PAPER: Discover how integrating social software with communications is transforming the modern workplace, maximizing the potential of human capital, and generating value for businesses worldwide.
Posted: 09 Apr 2013 | Published: 02 Oct 2012

IBM

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit
sponsored by Attachmate Corporation
CASE STUDY: This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!
Posted: 09 Apr 2013 | Published: 30 Mar 2012

Attachmate Corporation

Introducing Social Business for the Mid-Market
sponsored by IBM
WHITE PAPER: Consult this resource to learn more about the insight Aberdeen research discovered by studying 229 mid-sized companies. They looked to uncover if there were specific characteristics that made companies more interested in using social business.
Posted: 09 Apr 2013 | Published: 09 Apr 2013

IBM

The New Universe of Managed File Transfer: Why Your Existing Solution May Not Be Adequate
sponsored by Attachmate Corporation
WHITE PAPER: Uncover the driving forces for an advanced managed file transfer (MFT) solution, as well as what to look for in such an approach and the many benefits you can enjoy after implementing a solution.
Posted: 09 Apr 2013 | Published: 29 May 2009

Attachmate Corporation

Getting Your Money’s Worth From Master Data Management
sponsored by SearchBusinessAnalytics
EBOOK: This handbook will provide IT and master data management (MDM) administrators, as well as business executives involved in sponsoring MDM initiatives, with practical advice on how to develop and implement successful programs.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchBusinessAnalytics

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Key insights for an effective records management strategy
sponsored by Iron Mountain
EGUIDE: Implementing new processes and workflows is just the beginning of establishing an effective records and information management (RIM) strategy. In this expert guide you will discover essential tips on how to ensure your RIM policy is not only highly effective but also sustainable. Read on to learn more.
Posted: 19 Dec 2012 | Published: 19 Dec 2012

Iron Mountain

Solution Spotlight: Data Quality, IT, and The Business
sponsored by IBM and Softchoice
EGUIDE: The consequences of poor quality data can be catastrophic – for BergerABAM, an engineering and construction company, the result of bad data was a $1 million deficit. Read this expert guide to learn why businesses today need data quality management policies and find out how to craft an effective initiative.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

IBM and Softchoice

Information Governance Strategy: Developing a Roadmap for Managing Corporate Info
sponsored by SearchContentManagement
EBOOK: Most organizations are looking for ways to better manage their structured and unstructured data – and information governance has the potential to do so. But implementing an effective program can be tricky. Review this e-book to gain practical tips on how to implement an information governance program, learn 5 pitfalls to avoid, and more.
Posted: 05 Sep 2012 | Published: 01 Sep 2012

SearchContentManagement

IBM and Oracle TCO: The Lumpy Mattress
sponsored by IBM
WHITE PAPER: This paper outlines Oracle's approach to overpricing one part of a database solution to compensate for another part, leading to a much higher total cost of ownership (TCO). Read this now to learn more about the evolution of TCO, Oracle's pricing strategy, IBM's pricing strategy and so much more.
Posted: 10 Aug 2012 | Published: 21 Sep 2011

IBM
201 - 225 of 573 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement