data management

Results 551 - 575 of 2488Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).
Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management
    
IBM
Published By: Schneider Electric     Published Date: Apr 20, 2018
Provide stable data center and network services across a multi-building, multi-campus school district.
Tags : 
data closets, cloud management, remote visibility, it staff, data center
    
Schneider Electric
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: NetApp     Published Date: Feb 22, 2010
Meeting growing storage needs and improving data resilience, without adding complexity to the IT environment.
Tags : 
netapp, law enforcement, storage, data resilience, business continuity, application performance, data management
    
NetApp
Published By: SAS     Published Date: Apr 16, 2015
The framework presented here is a way to avoid data dysfunction via a coordinated and well-planned governance initiative. These initiatives require two elements related to the creation and management of data: • The business inputs to data strategy decisions via a policy development process. • The technology levers needed to monitor production data based on the policies. Collectively, data governance artifacts (policies, guiding principles and operating procedures) give notice to all stakeholders and let them know, “We value our data as an asset in this organization, and this is how we manage it.”
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 20, 2015
To create real business value with data scientists, top management must learn how to manage them effectively.
Tags : 
    
SAS
Published By: EMC Corporation     Published Date: Jul 07, 2013
While the concept of big data is nothing new, the tools and technology and now in place for companies of all types and sizes to take full advantage. Enterprises in industries such as media, entertainment, and research and development have long been dealing with data in large volumes and unstructured formats - data that changes in near real time. However, extracting meaning from this data has been prohibitive, often requiring custom-built, expensive technology. Now, thanks to advancements in storage and analytics, all organizations can leverage big data to gain the insight needed to make their businesses more agile, innovative, and competitive.
Tags : 
big data, emc, technology, storage, analytics, data management
    
EMC Corporation
Published By: Delphix     Published Date: Feb 28, 2013
Join this session to learn how organizations like Deutsche Bank, Proctor and Gamble, Facebook, EA, Stubhub and many more are realizing significant returns with Delphix.
Tags : 
roi, database virtualization, it applications, data management, agile data management software
    
Delphix
Published By: Delphix     Published Date: Feb 28, 2013
This paper by analyst firm ESG describes the key challenges in ERP upgrade projects, and maps specific database virtualization functions to each challenge.
Tags : 
erp, enterprise resource planning, database virtualization, data management, virtualization
    
Delphix
Published By: Delphix     Published Date: Feb 28, 2013
Download this paper to learn how a virtual data storage solution can provide a simple and effective way to overcome obstacles and enable rapid deployment of multiple development and test databases against production systems with minimal storage use.
Tags : 
data management, virtualization, database virtualization, data warehousing
    
Delphix
Published By: Delphix     Published Date: Feb 28, 2013
Learn how Delphix uniquely addresses ballooning ERP project costs and inagility through patent-pending database virtualization software.
Tags : 
database virtualization, roi, data management, data management software, erp
    
Delphix
Published By: Delphix     Published Date: Feb 28, 2013
Agile Data Management eliminates the common barriers to successful agile development, reducing both the cost and the risk of short, parallel development projects. This paper discusses common challenges and the technical solutions for addressing them.
Tags : 
database virtualization, roi, data management, data management software, agile development, application development
    
Delphix
Published By: CDW     Published Date: Nov 12, 2012
This white paper will explain DCIM as well as provide technology advice on teh tools and practices for its implementation and use, and how to take advantage of DCIM to improve energy efficiency and effectiveness in the data center.
Tags : 
data center, infrastructure
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
Data center priorities have been consistent for some time: Improve efficiency, increase uptime and meet compliance regulations are IT mantras.
Tags : 
data centers, infrastructure, it infrastructure, data center convergence
    
CDW
Published By: TIBCO     Published Date: Apr 08, 2013
As the volume of available data increases, and we have new ways of extracting insights from data, it is valuable to take a step back and examine the impact of these insights on integration and company actions. Join us for this webinar and learn how you can use big data in your organization.
Tags : 
big data, integration, architecture, database, data warehousing, operations management
    
TIBCO
Published By: Dell Software     Published Date: Oct 03, 2013
In contrast to competing APM solutions, most of which focus on technical metrics, the release of Foglight 5.9 delivers detailed information about users, user actions and application usability.
Tags : 
dell, foglight, apm, big data, best practices, application performance management, technology, user experience
    
Dell Software
Published By: NetApp     Published Date: Sep 24, 2013
"Storage system architectures are moving away from monolithic scale-up approaches and adopting scale-out storage – providing a powerful and flexible way to respond to the inevitable data growth and data management challenges in today’s environments. With extensive data growth demands, there needs to be an increase in the levels of storage and application availability, performance, and scalability. Access this technical report that provides an overview of NetApp clustered Data ONTAP 8.2 and shows how it incorporates industry-leading unified architecture, non-disruptive operations, proven storage efficiency, and seamless scalability."
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations
    
NetApp
Published By: Oracle     Published Date: Jul 20, 2016
This paper will provide recommendations on how to modernize your finance organization in order to become a true co-pilot of the business.
Tags : 
finance management, data management, cloud, digital innovation, finance
    
Oracle
Published By: Oracle     Published Date: Jul 20, 2016
This analysis explores the financial benefits - as well as the security and reliability benefits - of moving to the cloud. With cloud delivering 2.1 the ROI of on-premise applications with lower initial and ongoing costs, and the environmental benefits of going cloud, it’s hard to argue against the cloud.
Tags : 
cloud, finance management, roi, data management, finance
    
Oracle
Published By: Oracle     Published Date: Jul 20, 2016
This report explores how, using cloud and analytics, finance leaders can leapfrog a few generations of technology and offer mature analytical feature/functionality and skills to the entire organization.
Tags : 
finance management, data management, cfo, digital innovation, technology, finance
    
Oracle
Published By: Plex Systems     Published Date: Aug 15, 2014
There has been no shortage of high profile recalls over the past several years. Suppliers are being required to provide more robust quality management systems, provide better real-time visablity into manufacturing data, and may even be held accountable for additional charge-back and warranty claims. Take a next generation approach to quality management.
Tags : 
    
Plex Systems
Published By: NetApp     Published Date: Jan 08, 2016
This IDC Technology Spotlight examines trends regarding cloud backup and data protection and how NetApp's SnapProtect backup management software and AltaVault cloud-integrated storage can play a role in simplifying the effort.
Tags : 
data protection, business continuity, cloud backup, snapprotect, backup management software, altavault, cloud-integrated storage
    
NetApp
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.