Data Governance Reports

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by TechTarget Security
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

TechTarget Security

Extended Enterprise Poses Identity and Access Management Challenges
sponsored by TechTarget Security
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security

Information Governance for Business Value
sponsored by IBM
EGUIDE: In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Setting the Stage for the Data Governance: A CIO's Guide
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
CASE STUDY: Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
Posted: 31 Jul 2013 | Published: 31 Oct 2007

Lumension

How to Achieve Device Control Peace of Mind
sponsored by Lumension
CASE STUDY: Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Lumension

Enterprise Information Protection - The Impact of Big Data
sponsored by IBM
WHITE PAPER: In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized.
Posted: 31 Jul 2013 | Published: 31 Mar 2013

IBM

Argyle Conversation with IBM: Big Data Buzz, Less is More
sponsored by IBM
WHITE PAPER: In this informative resource, access a Q and A with the Director of Information Lifecycle Governance for IBM Worldwide, Sylvan H. Morley III, as he discusses the impact of big data on modern organizations, and gives advice on overcoming challenges to information lifecycle management.
Posted: 31 Jul 2013 | Published: 03 Jul 2013

IBM

Solution Brief: InfoSphere Optim Data Masking Solution
sponsored by IBM
WHITE PAPER: This crucial white paper examines an integrated platform for defining, integrating, protecting and managing trusted information across your systems that you can use to mask data on demand to protect privacy while ensuring security.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Path Towards Defensible Disposal
sponsored by IBM
VIDEO: This short video explores IBM's information lifecycle governance solutions. find out how you can approach information governance as an economic solution at data growth, and increase the value of information assets while driving down cost and risk.
Posted: 29 Jul 2013 | Premiered: 26 Jan 2012

IBM

Metropolitan Corporate Counsel: Defensible Disposal of Data – IBM Solution Eliminates 'Corporate Junk'
sponsored by IBM
NEWSLETTER: This brief resource explores the implications and burdens of eDiscovery and the implementation of information governance to get rid of the junk and improve your company's bottom line. Read on to learn more.
Posted: 29 Jul 2013 | Published: 30 Apr 2013

IBM

Modern Retention Enablement
sponsored by IBM
VIDEO: This quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.
Posted: 26 Jul 2013 | Premiered: 25 Jun 2012

IBM

Handbook: Identity and Access Management
sponsored by TechTarget Security
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

IBM: An Early Leader across the Big Data Security Analytics
sponsored by IBM
WHITE PAPER: Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
Posted: 22 Jul 2013 | Published: 28 Jun 2013

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

Deliver Dynamic Efficiency with Power Systems Cloud Solutions
sponsored by IBM.
WEBCAST: This webcast takes an in-depth look at IBM Power Systems as an advanced virtualization platform for streamlined cloud deployment. Learn more about the RAS features scalability and performance capabilities.
Posted: 17 Jul 2013 | Premiered: May 22, 2013

IBM.

Apache Hadoop Patterns of Use
sponsored by Hortonworks
WHITE PAPER: When it comes to Hadoop, the technology most often associated with big data, why is it so popular? Does it actually live up to the vendor hype? Check out this informative resource to get the real guidance you need to figure out where Hadoop fits into your organization, and how you can leverage it to extract the most from your big data.
Posted: 17 Jul 2013 | Published: 30 Apr 2013

Hortonworks

Oracle Information Architecture: An Architect’s Guide to Big Data
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Access this helpful resource to explore how to add big data capabilities to your mainstream information architecture, learn how to plan for the adoption of new tools from an enterprise architecture perspective, and get six best practices for big data projects.
Posted: 17 Jul 2013 | Published: 31 Aug 2012

Oracle Corporation UK Ltd

Kick-Starting Your Data Quality Program
sponsored by TechTarget Data Management
EBOOK: This handbook offers tips and strategies for balancing manual and automated data quality processes, building a business case for purchasing data quality tools and creating an effective data quality program.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

TechTarget Data Management