> Technology > Data Management
 

Data Management

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.
Results 1 - 25 of 1581Sort Results By: Published Date | Title | Company Name
By: Microsoft Dynamics     Published Date: Apr 15, 2015
If you aren’t tapping into social selling, you’re missing out. Customers want to be treated like individuals, not psychographic profiles. The more connected you are to today’s social and mobile customer, the better chance you have of establishing trust and having an honest dialogue. Social doesn’t replace email. Cold calls aren’t dead. These tactics all have their time and place, but social represents the most exciting channel that sales has had in a long time to stay connected and informed.
Tags : crm, microsoft crm, microsoft dynamics, crm online, free crm for small business
     Microsoft Dynamics
By: IBM     Published Date: Apr 14, 2015
Whether it's a web application or an enterprise cloud application, Websphere Application Server has the right fit-for-purpose cloud environment for your business.
Tags : web application, ibm, enterprise cloud application, cloud environment, application server
     IBM
By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : riak, basho, telecommunications service provider, license fees, scalability
     Basho
By: IBM     Published Date: Apr 09, 2015
Confused by all the agile advice? Relax! With Agile For Dummies by your side you’ll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.
Tags : agile, ibm, productivity, software teams, customer satisfaction
     IBM
By: IBM     Published Date: Apr 09, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : it threat, security threat, security operations center, ibm, optimization
     IBM
By: IBM     Published Date: Apr 09, 2015
IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based on the following criteria: Service capability across the MSS life cycle; Revenue and Geographic presence.
Tags : mssp, idc, idc marketscape, global managed security services, ibm
     IBM
By: IBM     Published Date: Apr 09, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.
Tags : data security, ibm, ibm infosphere, privacy strategy, big data security
     IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security
     IBM
By: IBM     Published Date: Apr 09, 2015
As The Business Becomes Digital, Security Must Become Data-Centric S&R leaders of enterprises undergoing a digital transformation will soon realize that in order to adequately ensure customer protection and enable a digital workforce, S&R pros must abandon traditional perimeter-based security and put the focus on the data by embracing Forrester’s Zero Trust Model.
Tags : data security, ibm, customer protection, digital workforce, zero trust model
     IBM
By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : data security, ibm, risk management, network security, security threat
     IBM
By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : data security, ibm, converged network security, security risk, it management
     IBM
By: IBM     Published Date: Apr 09, 2015
Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.
Tags : magic quadrant, ibm, intrusion prevention systems, security, security risk
     IBM
By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : access management solution, ibm, security risk, security compliance, it management
     IBM
By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : user identities, ibm, user access privileges, customer satisfaction, information access
     IBM
By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : ibm, user access, enhanced security, security risk, it management
     IBM
By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : ibm, risk management, security risk, security officer, data security
     IBM
By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management
     IBM
By: Cisco     Published Date: Apr 08, 2015
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at nextgeneration security solutions. It also offers: • An analysis of the capabilities you should look for (and demand) in your network security solutions • Arms you with the information you need to be an educated buyer • Helps you get what you need, and not a set of future capabilities packaged in a “marketecture” that you can’t deploy
Tags : next generation, firewall, malware, threat, complexity
     Cisco
By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : next generation, firewall, malware, threat, complexity
     Cisco
By: Cisco     Published Date: Apr 08, 2015
NSS research indicates that NGFW devices are typically deployed to protect users rather than data center assets, and that the majority of enterprises will not tune the IPS module separately within their NGFW. Therefore, NSS evaluation of NGFW products is configured with the vendor pre-defined or recommended,“out-of-the-box” settings, in order to provide readers with relevant security effectiveness and performance dimensions based upon their expected usage.
Tags : next generation, firewall, malware, threat, complexity
     Cisco
By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : next generation, firewall, malware, threat, complexity
     Cisco
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day
     Cisco
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day
     Cisco
By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : protection, analytics, global security, intelligence, virtual
     Cisco
By: Basho     Published Date: Apr 07, 2015
Did you know that the total amount of data will reach 44 zettabytes by 2020 and that 80% of that data will be unstructured data? Are you ready for all of this unstructured data? More importantly, do you know how to turn it into a competitive advantage? Learn about the challenges that come with unstructured data and how to deal with those challenges in our latest publication “Meeting the Challenges of Unstructured Data” In this Whitepaper you’ll learn: What is driving the growth in unstructured data The challenges associated with managing unstructured data How companies are capitalizing on the opportunities that unstructured data presents to save money, time, and create new market opportunities
Tags : basho, unstructured data, competitive advantage, new market opportunities, managing unstructured data
     Basho
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search