governance

Results 476 - 500 of 504Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Apr 16, 2015
SAS Institute is gearing up to make a self-service data preparation play with its new Data Loader for Hadoop offering. Designed for profiling, cleansing, transforming and preparing data to load it into the open source data processing framework for analysis, Data Loader for Hadoop is a lynchpin in SAS's data management strategy for 2015. This strategy centers on three key themes: 'big data' management and governance involving Hadoop, the streamlining of access to information, and the use of its federation and integration offerings to enable the right data to be available, at the right time.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
This TDWI Checklist provides seven steps your organization can follow to apply a balanced governance strategy as you expand your use of self-service visual analytics and discovery.
Tags : 
    
SAS
Published By: Infosys Technologies Limited     Published Date: Sep 22, 2010
This white paper describes creating a governance framework for managing identity.
Tags : 
governance, compliance, identity analytics, identity management
    
Infosys Technologies Limited
Published By: Forensics Consulting Solutions     Published Date: Jan 31, 2011
A guide to understanding electronically stored information and workflows used to produce data for litigation.
Tags : 
e-discovery, esi, electronic discovery, electronically stored information, workflows, data governance, database security
    
Forensics Consulting Solutions
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This IDC White Paper discusses the impact of the critical records management, data retention, and data protection regulations across key geographies. It concludes with recommendations for developing global information governance best practices.
Tags : 
hp + intel, idc, data retention, data protection regulations, records management, global records compliance, information management
    
HP and Intel® Xeon® processors
Published By: Vendor Management Solutions, LLC     Published Date: Apr 12, 2011
Outsourcing advisors available for small and mid-sized companies.
Tags : 
outsourcing, governance, consultants, advisor, strategic sourcing
    
Vendor Management Solutions, LLC
Published By: AvePoint     Published Date: May 11, 2011
This document is intended to aid IT administrators and other stakeholders responsible for managing Microsoft SharePoint deployments, in planning and implementing a comprehensive, reliable and efficient governance strategy
Tags : 
governance, sharepoint, infrastructure management, compliance, document management, migration, auditing, administration, corporate governance, information management
    
AvePoint
Published By: Trillium Software     Published Date: Jun 06, 2011
The second Web seminar in the series is titled "Data Governance". Learn how Digital River successfully implemented Data Governance across their organization.
Tags : 
trillium software, operational data quality, upstream operational systems, data governance, data monitoring, businessprocesses, digital river, data management, business applications, business intelligence, data quality, data warehousing
    
Trillium Software
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
This white paper will identify the Top 7 issues which businesses using spreadsheets to manage their fixed asset data are failing to address.
Tags : 
real asset management, ram, spreadsheets, fixed assets control, fixed asset management system, corporate governance, data integrity, depreciation, audit trail, security, parent/child assets, asset splits, batch disposals, forecasting, multi-book capabilities
    
Real Asset Management Inc.
Published By: McAfee     Published Date: Oct 28, 2013
Watch this 3 minute video for a unique way of accessing public and private cloud services without losing governance and situational awareness.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, cloud computing
    
McAfee
Published By: Adobe     Published Date: Jan 31, 2013
In this Adobe white paper, How to Create a Data-driven Dynasty, Brent Dykes identifies the key areas executives should focus on to generate a greater return on their digital analytics investment.
Tags : 
digital analytics, roi, increasing roi, digital governance, digital strategy
    
Adobe
Published By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : 
security, cloud, ibm, access management, identity management, governance, risk management, compliance
    
IBM
Published By: IBM     Published Date: Jan 25, 2013
Educating Everyone To Guard the Cloud
Tags : 
security, cloud, ibm, access management, identity management, governance, risk management, compliance
    
IBM
Published By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : 
it governance, risk, compliance, servicenow, webinar, software development, it management, knowledge management, platforms, data management, business technology
    
ServiceNow
Published By: NETIQ     Published Date: Mar 12, 2013
Sally Hudson, IDC research and analysis, sums up thoughtful Q&A session that highlights evaluating access governance solutions, developing agile processes and policies that meet security and compliance needs.
Tags : 
idc research, governance solutions, netiq
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management, business technology
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Is change and complexity causing you to rethink your approach to identity, security and governance? Examine some of the challenges organizations face when developing and adapting a compliance program.
Tags : 
iag, identity management, access governance, it security, compliance, business technology
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet IT’s demands and simple for non-IT professionals to manage.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Published By: Pega     Published Date: Sep 11, 2015
In this new report, Pegasystems is recognized as a leader in the growing market for flexible case management solutions. Pega leads the market in delivering applications that meet rising expectations for: -Built-in change governance procedures -Open APIs -Ability to federate case management -Flexible data structures -Focus on business outcomes
Tags : 
    
Pega
Published By: IBM     Published Date: Oct 26, 2017
Threats to your digital assets are everywhere. They’re constant. So you build defenses to keep them out. But like a carpenter framing a new addition to a house, you want to regularly step back from working on the details for a full view of your work. Do the enterprise security measures you’ve built do a complete job of protecting against intrusions? Or have you left any gaps that allow bad actors an easy way in? When you check all the possibilities, you might be surprised.
Tags : 
data protection, sensitive data, data security, identity governance, digital assets
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Not long ago, job roles were relatively easy to define and control. A person was an “accountant” or a “graphic designer” or a “business partner.” But as organizations grew and business software became more sophisticated, new roles were added. “Accountant, New York” might require different access to applications and data than “Accountant, Chicago.” The challenge comes from the recent explosion in the numbers and types of business roles.
Tags : 
identity governance, entitlements, authorized users, orphan accounts, business activities
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
When choosing among providers of identity and access management as a service (IDaaS), a great place to start is evaluating your own organization’s IAM needs. Create a personalized list of your identity and access management (IAM) needs and determine if IBM® Cloud Identity Service is right for you. With this checklist, you will be able to determine if your needs match up with the benefits of IBM Cloud Identity Service.
Tags : 
iam, idaas, web access management, cloud based security, governance administration, enterprise grade identity
    
IBM
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Digital transformation is a concept on every IT and business leader’s mind, from improving back-office operations to creating better front-office experiences. Yet when it comes to adopting the latest information management technologies and digitally transforming operational processes, some organizations are further along than others. Download this report to find out how your organization stacks up.
Tags : 
strategy, digital, transformation, onbase, hyland, information, management, cloud, governance, content, back-office, whitepaper, enterprise, transforming, business, industry
    
OnBase by Hyland
Published By: IBM     Published Date: Apr 13, 2018
You can’t walk out the door without being inundated with messages on cloud. Get educated and help your organization make smarter choices.
Tags : 
cloud, governance, trusted data
    
IBM
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept