Information Security Research Library

Powered by Bitpipe.com

Data ClassificationResearch

  • Automating Information Governance - assuring compliance

    Sponsored by: ComputerWeekly.com

    This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Predictions 2014: Identity and Access Management

    Sponsored by: IBM

    This Gartner report reveals predictions for identity and access management (IAM) tools needed for 2014.

  • Governance, Risk Management and Compliance (GRC)

    Sponsored by: ComputerWeekly.com

    Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth.

  • CW buyer's guide: data management

    Sponsored by: ComputerWeekly.com

    A data management platform is a centralised computing system for collecting, integrating and managing large sets of structured and unstructured data from disparate sources. Effective use of such information management systems will provide access to consistent, accurate and current data.

  • The Importance of Continuity in Office 365 Environments

    Sponsored by: Mimecast

    Email is essential for communications, collaboration and content sharing, and it must remain available as close to 100% of the time as possible for your employees to be productive. This white paper focuses on the importance of continuity for the popular cloud-based email platform, Microsoft Office 365.

  • CW Buyer's Guide: Big Data Infrastructure

    Sponsored by: ComputerWeekly.com

    Computer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.

  • The Human Face of Big Data: Pulse of the Planet

    Sponsored by: ComputerWeekly.com

    Big Data is about to radically transform our understanding of the planet, writes entrepreneur and commentator, Esther Dyson.

  • Mobile Data Security and Compliance Challenges in the Enterprises

    Sponsored by: SearchSecurity.com

    The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.

  • Reduce Costs with Streamlined Information Management

    Sponsored by: Iron Mountain

    This white paper reveals how forward-thinking organizations are bringing their growing collection of paper and electronic records under control and realizing considerable cost savings at the same time. Read now to learn more.

  • Next Generation Datacentres Index –Cycle II

    Sponsored by: ComputerWeekly.com

    Following on from the first cycle of research carried out in February 2011, this r e-run of the next generation datacentre research covered 10 regions to identify what progress organisations have made in preparing to adapt to new IT architectures and approaches to computing.

  • Data Protection 101: Essential Steps for Holistic Information Security

    Sponsored by: SearchSecurity.com

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

  • Data Management Strategies for the CIO

    Sponsored by: SearchDataCenter.com

    CIOs are turning to emerging forms of data management, including predictive business intelligence and information architectures, to harness the power of their data. Inside this expert e-book, gain insight on data management topics such as storage and retention policies, data protection and lifecycle management.

  • Converting to the Cloud and Tackling the Challenges Within

    Sponsored by: Tenable Network Security

    In this expert e-guide, discover how to convert your company to the cloud. Security experts will take you through the positives and negatives of investing in the cloud and bring to light the compliance challenges that may arise when doing so.

  • Extracting Business Value from Unstructured Data

    Sponsored by: HP & Intel®

    Though the value of extracting intelligence from high-volume unstructured data is attractive, attempting to do so without a strategy could be disastrous for your company.  This expert-created e-guide illustrates how companies can successfully extract and analyze data to make better business decisions and reap the most benefits.

  • Managing Big Data - In Small Steps

    Sponsored by: Hitachi Data Systems

    Check out this quick resource to make sure you're getting real value and information out of all the data you're storing.

  • Big Data: 8 Considerations for Choosing an Infrastructure to Hold It All

    Sponsored by: FileTek, Inc.

    This expert E-Guide explores what's driving the big data movement, and cutting through vendor hype and overreaction. Read now to learn more.

  • Oracle: Big Data for the Enterprise

    Sponsored by: Oracle Corporation

    Oracle offers the broadest and most integrated portfolio of products to help you acquire and organize these diverse data types and analyze them alongside your existing data to find new insights and capitalize on hidden relationships. Read this white paper to learn more.

  • Information Retention and eDiscovery Survey

    Sponsored by: Symantec Corporation

    This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.

  • Enterprise data governance: How to succeed where others have failed

    Sponsored by: DataFlux Corporation

    This eBook, written for IT and data management professionals as well as business executives, will provide readers with tips and advice on how to avoid the missteps that can lead to enterprise data governance failures.

  • Maximizing your enterprise data storage capacity: Improve efficiency and utilization

    Sponsored by: Dell Compellent

    This tutorial from SearchStorage.com explores different backup tools that can improve the efficiency and utilization of your IT infrastructure by getting the most out of your storage capacity. Backup methods discussed in this tutorial include SRM tools, tiered storage models, classification and migration tools, thin provisioning and more.

  • The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data

    Sponsored by: MarkLogic

    This report details a survey of IT and data managers conducted by Unisphere Research, in partnership with MarkLogic. Read it and discover how organizations who responded treat and manage a growing amount of unstructured data.

  • Data Protection: Evaluating Business Requirements & Classifying Your Data

    Sponsored by: BakBone

    This paper discusses an approach to evaluating data at a business level, and implementing a data protection strategy that safeguards your organization based on the value of its data.

  • A Smarter Approach to Archiving

    Sponsored by: IBM

    Read this paper to learn how IBM is applying its expertise, global scope, and creativity to build the information backbone of twenty-first-century industries and public institutions. Continue reading to learn the benefits that a smart archive strategy can provide for your organization.

  • SiSense Prism Do-It-Yourself Business Intelligence Software

    Sponsored by: SiSense Ltd.

    Cutting-edge, do-it-yourself business intelligence (BI) and analytics. Go from mountains of raw data to reports, dashboards and analytics in a single product, in just an hour or two! Data preparation and mash ups are quick and easy, using visual drag-and-drop tools.

  • The IT View of User Data Management

    Sponsored by: Copiun

    Access this article to explore the IT view point of user data management, and learn what considerations to be aware of when searching for a user data management solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.