governance

Results 301 - 325 of 505Sort Results By: Published Date | Title | Company Name
Published By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : 
access control, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa, corporate governance
    
Aveksa
Published By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : 
gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold, cloud archiving, storage costs, information governance, archiving, regulatory compliance, information governance, discovery, ediscovery, file shares, managing content, cloud archiving, email retention
    
Proofpoint
Published By: Progress Software BTA Financial     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance, service oriented architecture
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance, service oriented architecture
    
Progress Software BTA Telecommunications
Published By: IBM Corporation     Published Date: Apr 26, 2010
Get more out of your information when you need it, and get rid of it when you don't. IBM's Smart Archive strategy will save you time, money and resources with a unified, enterprise-wide approach to archiving and information governance.
Tags : 
ibm filenet, smart archive strategy, data archiving, unify content, archive, data warehousing
    
IBM Corporation
Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension
Published By: IBM Corporation     Published Date: Jun 28, 2011
Managing a mixed platform and vendor IT environment presents many challenges. The problems escalate with the number of different tools used to manage the infrastructure. Customers are looking to reduce the number and variety of management tools they must use. One early adopter of IBM's ITCAM for Microsoft Applications shares the lessons learned from that experience and comments on the benefits of the latest version.
Tags : 
enterprise monitoring, service management, tivoli, itcam, netcool, business service, composite application, soa governance, application performance, monitoring, websphere, application monitoring, transaction tracking, diagnostic, ibm isms, service oriented architecture
    
IBM Corporation
Published By: IBM     Published Date: Nov 09, 2012
This IT Manager's Journal takes a close look at information governance and optimization as a requisite element for success in almost any information management project - as well as delivering an efficient IT infrastructure.
Tags : 
ibm, system z, system monitor, it organization, data governance, data governance solution, it management, business technology
    
IBM
Published By: IBM     Published Date: Nov 09, 2012
Many organizations today are introducing additional controls and accountability into management practices to improve governance and mitigate against risk. Read this white paper to learn more about Information governance and auditing with System Z.
Tags : 
ibm, system z, information governance audit, protection, data protection, business technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2013
IBMís security controls provide privacy and controlled authorization to sensitive information while enabling business operations. SC4SB protects our customers' information through governance, tools, technology, techniques, and personnel.
Tags : 
smartcloud, ibm, social business security, ibm smartcloud, security, it management, data management, business technology, data center
    
IBM
Published By: SAP     Published Date: Sep 12, 2012
In this whitepaper, you'll learn how SMEs can take a strategic approach to identify which mobile business apps will yield the strongest business value.
Tags : 
mobile solutions, mobile business applications, sme, sap, mobile governance, mobility
    
SAP
Published By: ITinvolve     Published Date: Jun 01, 2012
Demonstrating PCI compliance with policies and regulations is an IT necessity, especially when periodic audits are conducted. ITinvolve has a better approach to change management with the capability to identify official PCI systems and their associated policies and documentation thus eliminating manual processes and reducing the risk of errors and delays.
Tags : 
it operations, information technology, audit, compliance, pci, governance, business technology
    
ITinvolve
Published By: NETIQ     Published Date: Jan 12, 2017
Todayís attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
Our analysis of the survey findings indicates that as enterprise organizations attempt to respond to the need to provide more access to more information online, the ability to govern that access is being strained to a breaking point.
Tags : 
    
NETIQ
Published By: IBM     Published Date: May 22, 2013
When it comes to application infrastructure, some of the burning questions that organizations are asking themselves include: If I host some of my application functionality in the could, how do I integrate that with my existing on-premises applications? How do I integrate my on-premises application with external business partners? Everyone is talking about platform as a service (PaaS). Should I use it? If so, when and when not? In this research, we address these questions by introducing the concept of iPaaS, a specific form of PaaS targeting integration and governance requirements, and how it can be used to address cloud-to-on-premises and other related requirements.
Tags : 
ibm, cloud, infrastructure, applications, application infrastructure, platform as a service, ipaas, paas, data warehousing, virtualization, cloud computing, infrastructure management
    
IBM
Published By: Box     Published Date: Feb 13, 2015
Bring your own anything is suffusing the enterprise, and CIOs are pursuing new governance structures to tame the mobile chaos.
Tags : 
byo, cio, governance, mobile, it management
    
Box
Published By: bigtincan     Published Date: Oct 10, 2014
Enabling the mobile workforce to be productive is the ultimate goal of any mobile business initiative. While the idea that mobile devices like the iPad, Galaxy Tab and todayís leading smartphones can change how users work in the enterprise is well established, the real challenge is how to enable a mobile workforce to have device access to all the different content they need to do their job without having to circumvent security and content governance objective or require users to learn a mix of consumer oriented software tools and work in different user interfaces in order to be productive. Viewing, editing, annotating and sharing content must be available from the same application.
Tags : 
mobile apps, user enablement, mobile workforce, mobile content
    
bigtincan
Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content
    
bigtincan
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management
    
ARMA
Published By: Microsoft Azure     Published Date: Apr 11, 2018
While itís clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. Youíll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
    
Microsoft Azure
Published By: AWS     Published Date: Oct 31, 2018
Watch this webinar to learn how a financial services organization uses a simple, comprehensive data governance solution from Dataguise to discover, protect, and monitor sensitive personal data in real time across all its Amazon Web Services (AWS) data repositories, and to prepare for GDPR compliance.
Tags : 
financial, services, organization, gdpr
    
AWS
Published By: AWS     Published Date: Dec 17, 2018
Watch this webinar to hear from AWS data governance experts and the leadership teams at Okta and Etleap. Learn how your organization can create unified, compliant, and analyst-friendly data repositories on AWS.
Tags : 
    
AWS
Published By: Druva     Published Date: Jan 06, 2016
Compiled from real life use cases, Blue Hill Research examined how organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to meet their wider data management needs.
Tags : 
druva, blue hill, enterprise, archive, data, user data, security, enterprise applications, business technology
    
Druva
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept