IT Management  >   Systems Operations  >  

Managing Data

RSS Feed    Add to Google    Add to My Yahoo!
Managing Data Reports
 
Securing Big Data Environments
sponsored by Hortonworks
RESOURCE: This resource outlines a particular security platform that can centralize data access policies and key management to protect the entire big data environment, including structured and unstructured data sources. Read now to learn how your organization can protect your data by accessing this resource.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Hortonworks

Five Things You Must Know About Microsoft BitLocker
sponsored by WinMagic
WHITE PAPER: This white paper presents a 5 step strategy to resolve all BitLocker security issues.
Posted: 25 Jun 2015 | Published: 17 Jun 2015

WinMagic

How to Navigate Data Lakes to Manage Big Data
sponsored by Dell, Inc. and Intel®
EGUIDE: Are data lakes a really good idea? It's unclear if this storage strategy really yields the cost-effectiveness companies look for. This expert e-guide highlights the value of data lakes. Click through to discover which data lake capabilities you need to ensure an IT budget well spent.
Posted: 29 Jun 2015 | Published: 29 Jun 2015

Dell, Inc. and Intel®

Manage Unstructured Data with Symantec Data Insight
sponsored by Symantec | Veritas
VIDEO: Learn how you can improve data governance through data owner identification and visibility into usage and access permissions.
Posted: 17 Jun 2015 | Premiered: 17 Jun 2015

Symantec | Veritas

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis

Streamline Digital Asset Management with a Digital Media Supply Chain
sponsored by OpenText
WHITE PAPER: Decision-makers searching for a guide to an ideal digital media supply chain (DMSC) solution will find 11 key criteria inside this featured expert resource.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

OpenText

How Big Data Affects Data Archiving
sponsored by Dell, Inc. and Intel®
EGUIDE: In this e-guide, storage expert Jon Toigo explains why performing analytics on big data sets means that data is no longer considered cold, eliminating the reasoning for archives. Learn the importance of leaving archival data where it's physically located, while marking and applying special services to the data that fit its archival class.
Posted: 29 Jun 2015 | Published: 29 Jun 2015

Dell, Inc. and Intel®

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

Factors to Consider for Your Big Data Storage Infrastructure
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert guide explains what factors you need to keep in mind when building storage architecture for big data, including I/O balancing and high-performance capabilities.
Posted: 02 Jul 2015 | Published: 29 Jun 2015

Dell, Inc. and Intel®

Minimizing Claims Leakage Using Machine Learning on Hadoop
sponsored by Hortonworks
RESOURCE: In this white paper you will learn about a combination of Hadoop and machine learning that can help your organization achieve big savings by reducing operating costs and claims overpayments.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

Hortonworks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement