Data Governance Reports

MDM: 5 Steps to Implementing a Successful Program
sponsored by Triniti
EGUIDE: Companies will typically begin MDM efforts in one domain area before expanding to a multi-domain program model. When taking the multi-domain leap, it's critical to keep key elements in mind. In an excerpt from a MDM book, experts explain how to identify MDM domains and your master data. Plus, learn 5 steps to implementing a MDM program.
Posted: 20 Mar 2017 | Published: 13 Mar 2017

Triniti

Business Value: The Key to Data Governance Software Selection
sponsored by TechTarget Data Management
EBOOK: This expert buyer's guide explores how to narrow down your choices for purchasing a data governance tool. Discover how to align business objectives with the software's capabilities and learn how to build data quality management and big data strategies into your data governance initiatives.
Posted: 12 Jan 2017 | Published: 06 Jan 2017

TechTarget Data Management

Strategies For Effective Big Data Governance And Supporting Analytics Programs
sponsored by IBM
EGUIDE: Governing large and varied sets of big data is difficult. In this expert e-guide, Dr. Anne Smith, Principal Consultant at Alabama Yankee Systems, LLC reveals 7 best practices for instituting effective policies for governing sets of big data. Plus, learn how a solid data governance plan sows the seeds for a successful self-service analytics program.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

IBM

Resource Center: How to Safeguard Data
sponsored by McAfee, Inc.
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

McAfee, Inc.

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

E-discovery Software Brings Serious ROI to Information Governance
sponsored by Globanet Veritas
EGUIDE: Access this guide to examine the importance of leveraging tools like autoclassification and predictive coding for effective information governance. Additionally, you will discover approaches that improve ROI beyond just e-discovery.
Posted: 30 Sep 2016 | Published: 28 Sep 2016

Globanet Veritas

Data Governance: Expert Q&A and Picking The Right DG Tool
sponsored by Globanet Veritas
EGUIDE: This e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.
Posted: 30 Sep 2016 | Published: 28 Sep 2016

Globanet Veritas

Hadoop Brings Affordable, Accessible Analytics to Businesses
sponsored by NEC Corporation of America
EGUIDE: This expert e-guide explores the history of Hadoop, starting at its inception and gazing ahead towards the uncertain future, as well as providing examples as to how Hadoop has helped enterprises with their big data analytics capabilities. Learn how Hadoop makes it feasible to process and use big data collected by companies great and small.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

NEC Corporation of America

Gathering, Organizing, and Presenting Your Data
sponsored by NEC Corporation of America
EGUIDE: In this expert e-guide we walk you through the best way to organize and present your data, and explain how you can access large amounts of information rapidly. You'll learn how to create a collaborative data governance program, implement data visualization techniques, avoid inconsistent analysis by removing the need for data sampling, and more.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

NEC Corporation of America

Information Governance: Expert Q&A, New Initiatives and Digital Drive
sponsored by Globanet Veritas
EGUIDE: This e-guide contains a Q&A that discusses how compliance and information governance programs can partner up to secure the funding required to meet both their objectives. Learn about new information governance initiatives and how new tech is driving digital information governance.
Posted: 28 Sep 2016 | Published: 27 Sep 2016

Globanet Veritas

Recovering From Ransomware Starts with a Data Protection Strategy
sponsored by Dell Software
EGUIDE: Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

How to Optimize Your Master Data Management Strategy
sponsored by IBM
EGUIDE: This expert e-guide explores an integrated approach to master data management (MDM) that incorporates an enterprise data governance program. Inside, you'll find out how to optimize your data quality strategy and learn how to garner business support for your MDM initiative.
Posted: 26 Sep 2016 | Published: 21 Sep 2016

IBM

Cloud Services Take Off, GRC Doesn't
sponsored by TechTarget Security
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

TechTarget Security

Crafting a Data Lifecycle Management Strategy to Control Capacity
sponsored by Iron Mountain
EGUIDE: Jon Toigo, Chairman of the Data Management Institute, explains how information lifecycle management (ILM) strategies can help classify data and control capacity by allocating it to the appropriate storage. Discover how recent improvements in ILM can enable your enterprise to truly benefit from implementing this strategy.
Posted: 08 Aug 2016 | Published: 03 Aug 2016

Iron Mountain

The Big Data Surge: Data Modeling Challenges & Best Practices for Prepping Big Data Apps for Production
sponsored by IBM
EGUIDE: Surging big data is changing data modeling techniques and app development cycles. Read on to discover what you should expect from big data's near-future and best practices when it comes to transitioning big data applications into the production stage.
Posted: 27 Jul 2016 | Published: 26 Jul 2016

IBM

Piecing Together a Clearly Defined API Management Strategy
sponsored by TechTarget App Architecture
EBOOK: As businesses develop a greater reliance on APIs, they need to recognize the importance of creating a simple, all-inclusive API management strategy.
Posted: 15 Jul 2016 | Published: 13 Jul 2016

TechTarget App Architecture

Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

An Effective Data Archiving System Can Ease Backup Woes
sponsored by Veritas
EGUIDE: This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Veritas

Yield Insight into Your Business Info with Data-Aware Storage
sponsored by DataGravity
EGUIDE: This expert guide discusses advanced "data-aware" storage infrastructure with big data processing capabilities and efficient metadata management. Learn how this infrastructure can provide your enterprise with intelligent, fast, and highly efficient data services that enables greater insight into your stored data.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity

Making the Case for Data-Aware Storage
sponsored by DataGravity
EGUIDE: This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity

Compliance Standards for Data Governance
sponsored by Smarsh
EGUIDE: This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

Smarsh

Tips and Tricks To Keep In Mind When Adopting A Hybrid Cloud Strategy
sponsored by SimpliVity
EGUIDE: Many small to medium-sized businesses have moved parts of their infrastructure to the cloud, but larger organizations have been slower to adopt this strategy because they already have an infrastructure in place. This e-guide details how the hybrid cloud allows these organizations to leverage their on-premises infrastructure as well as the cloud.
Posted: 25 Feb 2016 | Published: 18 Feb 2016

SimpliVity

How an Identity Management System can Improve Mobile Security
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.
Posted: 22 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation