> Technology > Data Management
 

Data Management

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.
Results 1 - 25 of 1410Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 23, 2015
Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.
Tags : it trends, it environments, smarter physical infrastructures, data protection, it management
     IBM
By: IBM     Published Date: Jan 23, 2015
Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Watch this webinar to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : storage environment, cloud storage, it efficiency, cloud agility, data-driven analytics
     IBM
By: Verisign     Published Date: Jan 22, 2015
As a leader in domain management and internet security, Verisign’s network supports more than 82 billion transactions on a daily basis, enabling nearly 50 percent of the internet’s domains. Building networks to survive the largest DDoS attacks on the internet is part of Verisign’s heritage, and Verisign has been using DDoS mitigation techniques for more than 16 years while protecting the .com and .net infrastructures. This gives Verisign the ability to flex its entire 1+ tbps infrastructure as needed in real-time response to attack scenarios against itself and its customers.
Tags : network capabilities, ddos attack mitigation, domain management, internet security, it infrastructure
     Verisign
By: Verisign     Published Date: Jan 22, 2015
The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. It represents a unique view into the attack trends unfolding online for the previous quarter, including attack statistics, DDoS malicious code analysis and behavioral trends
Tags : service trends report, ddos, security research, it security analytics, ssdp vulnerability
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Cyber security threats have become more pervasive and damaging than ever, ranging from advanced persistent threats to massive distributed denial of service (DDoS) attacks. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network even as zero-day threats emerge and known threats evolve.
Tags : ddos protection, cyber security threats, cloud-based protection, best practices, it management
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Versign OpenHybridTM is a Verisign DDoS Protection Services architecture that enables interoperability between on-premise and cloud-based platforms. An easy to use tool (Open API), allows customers to leverage existing security perimeter devices to signal threat information to the Verisign DDoS protection cloud, when the capabilities of the device are exceeded. Verisign OpenHybrid™ can also be applied to monitor and protect services hosted within other public and private cloud services.
Tags : api specification, cloud signaling, ddos attacks, threat visibility, risk mitigation
     Verisign
By: CareCloud     Published Date: Jan 21, 2015
Watch this on-demand webinar to learn how one scenario can help get the most from its PM and EHR.
Tags : carecloud, pm and ehr, boost revenue, ehr too expensive, practice ehr
     CareCloud
By: SugarCRM     Published Date: Jan 20, 2015
After an initial rollout to more than 45,000 sales users, IBM wanted even greater insights. Thanks to the high usability of Sugar, IBM was able to increase sales data quality - which has gone on to power predictive sales analytics. Learn how IBM and SugarCRM are driving more effective sales teams.
Tags : sales analytics, data quality, sales, high usability, enterprise applications
     SugarCRM
By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : firewall, buyers guide, protocols, next generation, networks
     Cisco
By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : comparitive analysis, datacenter, social, analytics, data management
     Cisco
By: Cisco     Published Date: Jan 15, 2015
In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.
Tags : operating costs, capital, threat detection, visibility, networks
     Cisco
By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : attacks, viruses, protection, networks, threats
     Cisco
By: CDW     Published Date: Jan 14, 2015
Learn why teams and fans love the benefits a stadium network upgrade can bring and see what your organization should do to capitalize on these business advantages.
Tags : network, upgrade, business advantages, benefits, data management
     CDW
By: IBM     Published Date: Jan 09, 2015
Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation with a proactive, business-centric approach to BCM that highlights critical practices.
Tags : business continuity management, risk management, bcm plan, business solutions, it management
     IBM
By: IBM     Published Date: Jan 09, 2015
Every organization must put a plan in place for recoverability after an outage, but testing your enterprise resilience without full business and IT validation is ineffective. Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading; understand why validating resilience demands involvement from IT and the business; and get details on the checks and balances you need to maintain and validate business resilience.
Tags : resiliency testing, it validation, business resilience, small-scale recovery simulations, it management
     IBM
By: IBM     Published Date: Jan 09, 2015
Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery, performance and scalability within its disaster recovery processes, and maximize backup performance and disaster recovery capabilities.
Tags : cloud computing solutions, service teams, cloud-based technology, it performance, it recovery capabilities
     IBM
By: IBM     Published Date: Jan 09, 2015
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : big data, mdm, client analytics, real-time analysis, it management
     IBM
By: IBM     Published Date: Jan 09, 2015
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base.
Tags : ibm, big data, insights, infosphere, data management
     IBM
By: IBM     Published Date: Jan 09, 2015
Early adopters of an extended 360° view will get competitive advantages over their rivals and this will force laggards to adopt a similar approach or lose business.
Tags : ibm, big data, insights, mdm, infosphere
     IBM
By: Polycom     Published Date: Jan 06, 2015
This document will outline five easy steps to create awareness, increase utilization and expedite adoption of video collaboration across your organization.
Tags : train, video, network, telecommuting, mobility
     Polycom
By: IBM     Published Date: Jan 06, 2015
Watch this webcast to learn how Pacesetters are using SaaS to provide their entire enterprise with a wide range of powerful benefits. SaaS can reduce costs, yes. But more than that, SaaS can engender rich and far reaching collaboration, lead to better decision making, and help your organization be more customer-focused and agile in the marketplace. That's not to say that the route to the winner's circle won't take some planning and preparation. You can start by asking yourself the right questions.
Tags : saas, collaboration, customer-focused organizations, business agility, it management
     IBM
By: Cisco     Published Date: Jan 05, 2015
The data center is central to IT strategy and houses the computational power, storage resources, and applications necessary to support an enterprise business. A flexible data center infrastructure than can support and quickly deploy new applications can result in significant competitive advantage, but designing such a data center requires solid initial planning and thoughtful consideration of port density, access-layer uplink bandwidth, true server capacity, oversubscription, mobility, and other details.
Tags : data center, consolidation, server virtualization, new applications, it management
     Cisco
By: Cisco     Published Date: Jan 05, 2015
Interest in cloud computing over the last several years has been phenomenal. For cloud providers, public or private, it will transform business and operational processes, streamlining customer on-ramping and time to market, facilitating innovation, providing cost efficiencies, and enabling the ability to scale resources on demand.
Tags : data center, consolidation, server virtualization, new applications, it management
     Cisco
By: Cisco     Published Date: Jan 05, 2015
The data center has gone through many major evolutionary changes over the past several decades, and each change has been defined by major shifts in architectures. The industry moved from the mainframe era to client/server computing and then to Internet computing. In 2011, another major shift began: the shift to a virtual data center. This has been the primary driver in enabling customers to transition to the cloud and ultimately IT as a service. The shift to a virtual data center will be the single biggest transition in the history of computing. It will reshape all the major data center tiers: applications, storage, servers and the network.
Tags : data center, consolidation, server virtualization, new applications, it management
     Cisco
By: Cisco     Published Date: Jan 05, 2015
More than ever, the data center is a gateway to opportunity, responsible for bringing together the data, applications, and IT resources needed to support growth and innovation. At Cisco we have the opportunity to observe how data center infrastructure is evolving in response to market and technology trends. In no particular order, here are five important strategies we see companies using to overcome the limitations of traditional IT infrastructure and transform their data centers to support innovation and growth.
Tags : data center, consolidation, server virtualization, new applications, it management
     Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search