trust

Results 1 - 25 of 904Sort Results By: Published Date | Title | Company Name
Published By: TD Bank Group     Published Date: Aug 10, 2018
This paper examines whether blockchain distributed ledger technology could improve the management of trusted information, specifically considering data quality. Improvement was determined by considering the impact of a distributed ledger as an authoritative source in TD Bank Group's Enterprise Data Quality Management Process versus the use of standard authoritative sources such as databases and files. Distributed ledger technology is not expected, or proven, to result in a change in the Data Quality Management process. Our analysis focused on execution advantages possible due to distributed ledger properties that make it an attractive resource for data quality management (DQM).
Tags : 
    
TD Bank Group
Published By: Trillium Software     Published Date: Mar 29, 2016
We are living in a new age in which your business success depends on access to trusted data across more systems and more users faster than ever before. However, your business information is often incomplete, filled with errors, and beyond the reach of people who need it. Whether you’re responsible for technology or information strategy, you need to enable your business to have real-time access to reliable information. Otherwise, your company will be left behind. Download Trillium’s whitepaper, “How to Succeed in the New Age of Data Quality”, to learn how you can create a successful data quality strategy.
Tags : 
    
Trillium Software
Published By: Trillium Software     Published Date: Apr 10, 2017
For the 11th consecutive year, the Gartner Magic Quadrant for Data Quality Tools1 research report positions Trillium Software as a leader in the Data Quality Software industry. Data Quality is vital to ensuring trust in your data-driven, decision making business processes. Confidence is the result of a well thought out and executed data quality management strategy and is critical to remaining competitive in a rapidly and ever-changing business world. The 2016 Gartner Magic Quadrant for Data Quality Tools report is a valuable reference, providing the latest insights into the strengths and cautions of leading vendors. Access the report to learn how a leading data quality solution can help you achieve your long-term strategic objectives.
Tags : 
    
Trillium Software
Published By: Experian     Published Date: Mar 30, 2017
Businesses today recognize the importance of the data they hold, but a general lack of trust in the quality of their data prevents them from achieving strategic business objectives. Nearly half of organizations globally say that a lack of trust in their data contributes to increased risk of non-compliance and regulatory penalties (52%) and a downturn in customer loyalty (51%). To be of value to organizations, data needs to be trustworthy. In this report, you will read about the findings from this unique study, including: · How data powers business opportunities · Why trusted data is essential for performance · Challenges that affect data quality · The current state of data management practices · Upcoming data-related projects in 2017
Tags : 
    
Experian
Published By: Experian     Published Date: Mar 12, 2018
Data is quickly becoming the currency of the emerging digital economy. As digital transformation efforts proliferate and become commonplace, data will take center stage as a critical driver of these initiatives. Organizations that are able to mobilize their data assets to power critical business initiatives will see a distinct advantage in the years to come. In fact, a majority of C-level executives (87%) believe that data has greatly disrupted their organization’s operations over the last 12 months. As the reliance on data deepens, the need for trustworthy and reliable data assets will become increasingly important. This year’s global study highlights several important issues and opportunities throughout the data management and data quality spaces. By discussing the latest advancements and challenges within our industry, we hope to empower all organizations to better leverage their data and to thrive in the digital economy.
Tags : 
    
Experian
Published By: Experian     Published Date: Mar 12, 2018
Data is quickly becoming the currency of the emerging digital economy. As digital transformation efforts proliferate and become commonplace, data will take center stage as a critical driver of these initiatives. Organizations that are able to mobilize their data assets to power critical business initiatives will see a distinct advantage in the years to come. In fact, a majority of C-level executives (87%) believe that data has greatly disrupted their organization’s operations over the last 12 months. As the reliance on data deepens, the need for trustworthy and reliable data assets will become increasingly important. This year’s global study highlights several important issues and opportunities throughout the data management and data quality spaces. By discussing the latest advancements and challenges within our industry, we hope to empower all organizations to better leverage their data and to thrive in the digital economy.
Tags : 
    
Experian
Published By: Reltio     Published Date: May 22, 2018
"Forrester's research uncovered a market in which Reltio [and other companies] lead the pack,” the Forrester Wave Master Data Management states. "Leaders demonstrated extensive and MDM capabilities for sophisticated master data scenarios, large complex ecosystems, and data governance to deliver enterprise-scale business value.” Reltio executes the vision for next-generation MDM by converging trusted data management with business insight solutions at scale and in the cloud. Machine learning and graph technology capabilities enable a contextual data model while also maintaining temporal and lineage changes of the master data.
Tags : 
    
Reltio
Published By: Alation     Published Date: Mar 26, 2018
When analysts and data scientists have access to data governance policies and best practices directly within the flow of their analysis, the result is both more consistent compliance and more broadly adopted best practices. With the combination of Tableau and Alation, organizations can not only balance the demands of agility and governance, they can actually optimize for both at the same time. We call this Governance for Insight. Learn more about how Tableau users can have the best of worlds - agility and governance. Read Enabling Governance for Insight: Trust in Data with Tableau and Alation’s Data Catalogs. Register on the right to access a complimentary copy of this joint white paper from Tableau and Alation.
Tags : 
    
Alation
Published By: Syncsort     Published Date: Jan 04, 2018
The term Big Data doesn’t seem quite “big enough” anymore to properly describe the vast over-abundance of data available to organizations today. As the volume and variety of Big Data sources continue to grow, the level of trust in that data remains troublingly low. Read on and discover how a strong focus on data quality spanning the people, processes and technology of your organization will help keep your data lake pristine.
Tags : 
    
Syncsort
Published By: R2C     Published Date: Jan 05, 2018
Consistent sharing of data across organizational boundaries is often hampered by a lack of transparency, visibility, and trust in the agreements made between parties who seek to share data assets. How does an organization with cultural barriers to sharing data assets engender trust in the process? Leveraging blockchain technology that “oraclizes” data sharing agreements may provide an answer.
Tags : 
    
R2C
Published By: IO-Tahoe     Published Date: May 14, 2018
The “silver lining” in GDPR compliance efforts is a creation of transparency and trust with customers, many of whom have layers of concern and trepidation over how all companies they do business with are handling their data. GDPR compliance efforts offer a chance to clear this air, between organizations and their customers, in a way that’s beneficial to both sides. In Io-Tahoe’s eBook, we explore the obligatory components of GDPR compliance, and the mindset most appropriate to achieving it. We also investigate opportunistic facets of establishing comprehensive protection policy around personal or sensitive data. We look at the prospect of GDPR compliance through the exploration of several “mandates”. Download the e-book to find out more on the eight mandates and the dividends beyond.
Tags : 
    
IO-Tahoe
Published By: DATAVERSITY     Published Date: Dec 23, 2013
Everyone in an organization relies on Metadata to do their jobs. Whenever an email is sent, a report is run, inventory is ordered, compliance procedures are verified, a new IT system is integrated, applications are executed, or essentially any other business function, process, or decision is undertaken, Metadata is facilitating in the background. If that Metadata is corrupt, missing, redundant, or unpredictable then they cannot do their jobs well, they cannot trust the data they are using, and the organization ultimately suffers at all levels. Data Stewards are the people who are use, define, cleanse, archive, analyze, and share the data that is mapped directly to the Metadata of their myriad database and application systems. If your organization does not have Data Stewards (or an inefficient Stewardship Program), you need them. This paper is sponsored by: ASG.
Tags : 
    
DATAVERSITY
Published By: First San Francisco Partners     Published Date: May 19, 2014
Master data management (MDM) is about people and process; it is not about technology. Implementing MDM technology alone will not address operational and business process challenges. Rather, “mastering” data involves people taking action through established data policies and processes. Data Governance ensures that data in the MDM hub is of high quality and can be trusted by business users. Lacking Data Governance, organizations do not have consistent data definitions or know what constitutes a data problem, who is accountable, what decisions need to be made, or how to escalate and resolve issues.
Tags : 
white paper, master data management, first san francisco partners, kelle o'neal, dataversity, data governance, mdm, master data management white paper, data governance white paper
    
First San Francisco Partners
Published By: ASG     Published Date: Jun 10, 2013
Everyone in an organization relies on Metadata to do their jobs. Whenever an email is sent, a report is run, inventory is ordered, compliance procedures are verified, a new IT system is integrated, applications are executed, or essentially any other business function, process, or decision is undertaken, Metadata is facilitating in the background. If that Metadata is corrupt, missing, redundant, or unpredictable then they cannot do their jobs well, they cannot trust the data they are using, and the organization ultimately suffers at all levels. Data Stewards are the people who are use, define, cleanse, archive, analyze, and share the data that is mapped directly to the Metadata of their myriad database and application systems. If your organization does not have Data Stewards (or an inefficient Stewardship Program), you need them.
Tags : 
asg, data, data management, data governance, white paper, dataversity, data steward, metadata
    
ASG
Published By: Sqrrl Data, Inc.     Published Date: Jun 02, 2014
With the dissolution of the “trusted zone”, Data-Centric Security is a key enabler for Big Data applications. Sqrrl's Enterprise is a NoSQL database that is built with a Data-Centric Security implementation that includes cell-level security labeling and enforcement, encryption at rest, encryption in motion, an automated data labeling engine, a security policy specification engine, custom secure search indexing, and an audit facility.
Tags : 
    
Sqrrl Data, Inc.
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape Note: The report is in english.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Aug 06, 2018
Technology is transforming how we do our jobs, and employees expect the business to accommodate their work habits. › Companies must identify roles and profiles and support their needs. Not every employee will require the same devices to get their jobs done efficiently and effectively. It is paramount for organizations to seek out specific devices to enable different worker personas. › IT must become a trusted partner to keep security top of mind. Employees showed a lack of trust toward IT when facing an issue with their device or ecosystem. It is imperative for IT to become part of the solution and not the problem; otherwise, workers will find ways to go around security policies and fix problems on their own, putting the firm at even more risk. › Employees require a more complete ecosystem. Employees need not only devices to get their jobs done effectively but an entire ecosystem as well. Without this, businesses will fall further behind in a fiercely competitive market and lose employ
Tags : 
    
Dell EMC
Published By: VMware     Published Date: Dec 18, 2018
VMware is once again positioned as a Leader in the Gartner Magic Quadrant for Hyperconverged Infrastructure. In the latest Magic Quadrant, Gartner acknowledges hyperconverged infrastructure is moving from compute and storage to a "full-stack." VMware believes it has the most trusted stack incorporating all major data center functions to deliver a single, ubiquitous control plane, agnostic of hardware. Download the report today to learn more about the hyperconverged infrastructure landscape and VMware's leading solution.
Tags : 
    
VMware
Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.