IT Management  >   Systems Operations  >   Data Management  >  

Data Auditing

RSS Feed   
ALSO CALLED: Auditing (Systems Operations), Auditing, Data Audits
DEFINITION: Sampling of a data collection and measuring it against various quality characteristics, such as accuracy, completeness, validity, nonduplication or timeliness to determine its level of quality or reliability.
Data Auditing White Papers (View All Report Types)
10 Matches
Digital Manufacturing: Data Readiness Audit
sponsored by Sight Machine
WHITE PAPER: Performing a comprehensive data audit can be the most crucial step to ensure a project is successful. The results of an audit can enable manufacturers to properly scope project objectives, expectations, and timelines. Use this self-assessment tool to discover how your data ranks under 5 categories.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Sight Machine

Why Archive?
sponsored by Flatirons Digital Innovations
WHITE PAPER: Open this guide to get a clearer look at the benefits of data archiving, and why it's becoming a near-essential tool in the wake of compliance crackdowns and increasing audit scrutiny – circumstances where long-term storage options often miss the mark.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Flatirons Digital Innovations

Tax Revenue Management and Economic Vitality
sponsored by IBM
WHITE PAPER: This whitepaper offers essential advice for governments looking to maximize their resources while increasing their capabilities. Read on to see how analytics could be the answer, offering deeper value from your tax revenue streams.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

IBM

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by Commvault
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Commvault

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos

The Business Case for Data Access Governance
sponsored by Varonis
WHITE PAPER: This white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
Posted: 01 Sep 2007 | Published: 31 Aug 2007

Varonis

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies
10 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement