IT Management  >   Systems Operations  >  

Managing Data

RSS Feed    Add to Google    Add to My Yahoo!
Managing Data Reports
 
Get the Facts on Two High-Performing Deduplication Products
sponsored by Quantum Corporation
RESOURCE: The following resource provides a direct comparison between two leading deduplication products. Access now and learn how each system compares in terms of max native performance, types of support, deduplication ability, and more.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

Quantum Corporation

Business Case for the Chief Data Officer
sponsored by Symantec | Veritas
RESOURCE: This research will help your organization, and IT leaders in particular, to decide whether or not it needs a CDO by asking the questions that need to be answered for the business case. Access this white paper now to put these questions to work for in the creation of a CDO business case for your enterprise.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec | Veritas

Securing Big Data Environments
sponsored by Hortonworks
RESOURCE: This resource outlines a particular security platform that can centralize data access policies and key management to protect the entire big data environment, including structured and unstructured data sources. Read now to learn how your organization can protect your data by accessing this resource.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Hortonworks

Taking Action On Data
sponsored by Symantec | Veritas
WHITE PAPER: In this white paper you will learn how the appropriate tools can help you organization identify your high value data. Read now to discover how you can devise your own strategy to take full advantage of this information to generate growth, gain a competitive advantage or reduce risk.
Posted: 17 Jun 2015 | Published: 01 Jun 2015

Symantec | Veritas

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis

The era of hybrid environments is here: Is your data refined and ready?
sponsored by IBM
WHITE PAPER: This resource describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. Read now to get simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Posted: 07 Jul 2015 | Published: 31 Mar 2015

IBM

Manage Unstructured Data with Symantec Data Insight
sponsored by Symantec | Veritas
VIDEO: Learn how you can improve data governance through data owner identification and visibility into usage and access permissions.
Posted: 17 Jun 2015 | Premiered: 17 Jun 2015

Symantec | Veritas

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Fighting Data Center Inefficiencies with Virtualization
sponsored by Springpath Inc
WHITE PAPER: This white paper details a storage virtualization platform that can solve problems related to slowed storage performance.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

Springpath Inc

How to Make Smarter Data Discovery Decisions
sponsored by Qlik
WHITE PAPER: This white paper seeks to illuminate customer pain points that data discovery may address, as well as ideal features and functionalities to consider. Read on to learn why research states that data discovery surfaces insights quickly, easily and affordably in comparison with traditional BI.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Qlik
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement