governance

Results 251 - 275 of 474Sort Results By: Published Date | Title | Company Name
Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework, security, data management
    
RSA
Published By: RSA     Published Date: Aug 28, 2014
Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Tags : 
data breach, data access, governance, risk, prevention, security, data management
    
RSA
Published By: Special Counsel     Published Date: Sep 18, 2015
Our 2016 Salary Guide takes an in-depth look at salaries for traditional legal occupations, as well as the most sought-after positions in growing areas such as Information Governance and eDiscovery. Accurate national and local salary data combined with up-to-date job descriptions provide you with the knowledge you need to engage, hire and retain premier legal professionals.
Tags : 
legal industry, legal talent, recruitment, job market, salary data, retention, legal talent
    
Special Counsel
Published By: VMware     Published Date: Nov 04, 2016
The digital economy is changing expectations for IT organizations, driving the need to rapidly provide resources to development, QA, and line-of-business teams to develop and roll out applications. While business wants IT to be more responsive, IT must address the need for speed with policy-driven governance, compliance, security, and performance. In our eBook, “Top 3 Reasons Why You Need Cloud Management,” we define the need for cloud management platforms, expand on the requirements and take a closer look at how other organizations are deploying cloud management platforms to improve management of the entire IT services delivery lifecycle.
Tags : 
    
VMware
Published By: VMware     Published Date: Nov 04, 2016
In order to keep pace with the business and developer demands inherent with the digital era, enterprise IT has picked up speed and scale by embracing the cloud. As a result of this mix of private on-premises clouds, hosted private clouds, and public cloud services, the modern data center has become a more complex and murky environment to manage. In the VMware eBook “How to Gain Visibility Across Your Multi-Cloud Environment,” we explore the power of the enterprise-ready cloud management platform (CMP) as a single solution for automating the delivery of IT resources, and managing those resources throughout their lifecycle across private and public clouds. Learn how you’ll gain the agility for accelerating IT delivery, the efficiency to improve OpEx and CapEx, the flexibility to leverage private or public cloud resources, and the level of control necessary to meet governance and security requirements.
Tags : 
    
VMware
Published By: Microsoft     Published Date: Jul 20, 2018
Each organization has a unique journey to the cloud based on its own starting point, its history, its culture, and its goals. This document is designed to meet you wherever you are on that journey and help you build or reinforce a solid foundation around cloud application development and operations, service management, and governance. At Microsoft, we have been on our own journey for the past decade, and over the past years we have learned important lessons by developing our own internal and customer-facing systems. At the same time, we've been fortunate to share the experiences of thousands of customers on their own journeys. This document is designed to share those experiences and distill them into proactive guidance. You do not need to follow these recommendations to the letter, but you ignore them at your peril. Our experience has shown that a careful approach to these topics will speed you along on your organization’s journey and avoid well understood pitfalls. For the past severa
Tags : 
    
Microsoft
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management, data protection
    
Mimecast
Published By: Trillium Software     Published Date: Jun 29, 2011
This white paper highlights how BT's experience of IQIP can help to inform the challenge of organizing for enterprise wide DQ, lists the key organizational structures, outlines the roles of the potential main protagonists and summarizes the main lessons learned.
Tags : 
trillium software, data quality, mdm, master data management, british telecommunications, entreprise wide dq improvement program, data governance, nigel turner
    
Trillium Software
Published By: IBM     Published Date: Mar 28, 2008
Service-oriented architecture (SOA) is an architectural style that offers business agility, speed to market, improved profitability and reduced costs. An SOA is also widely recognized as an enabler of innovation and new business operating models.
Tags : 
    
IBM
Published By: IBM     Published Date: Mar 28, 2008
For service-oriented architecture (SOA) to succeed, it needs to begin before run-time, with a strong SOA-based development and delivery environment. This paper discusses some of the challenges around SOA governance in the context of a lifecycle of services, and introduces IBM Rational Asset Manager software as a solution to those challenges.
Tags : 
software development
    
IBM
Published By: IBM     Published Date: Mar 28, 2008
Implementing an SOA includes implementing a governance model that supports SOA. In fact, without a robust SOA governance model, an SOA implementation will not realize the benefits that the architecture has to offer. Without effective governance, an SOA project — no matter how big or small — will fail.
Tags : 
ibm, soa, governance
    
IBM
Published By: IBM     Published Date: May 12, 2008
Managing compliance is a huge challenge for companies, straining IT resources needed to meet service level agreements. To overcome these challenges, IT must support the objectives of your business. This white paper describes how IBM Service Management does just that. It defines and monitors IT governance and compliance management in a repeatable manner across businesses of any size.
Tags : 
service, service management, sla, service level, ibm, ibm g&rm, ibm grm, compliance
    
IBM
Published By: IBM     Published Date: May 12, 2008
Challenges like competitive pressures, compliance activities and higher operational costs make service management more critical than ever. To keep up, IT operations must constantly improve visibility, control and automation while bridging the gaps among business, development and daily operations.
Tags : 
itil, service management, governance, risk management, ibm, ibm g&rm, ibm grm
    
IBM
Published By: IBM     Published Date: Mar 04, 2009
Software and systems are essential to nearly every business. Global organizations require software solutions that span geographic boundaries, cultures, and business units and that comply with corporate governance mandates. Such global businesses must collaborate effectively and leverage existing investments, or lose out to competitors.
Tags : 
ibm, global technology infrastructure, open source initiatives, alm, jazz project, enterprise applications
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
Adopting an Integrated Data Management strategy can be a highly effective way to help IT support business growth, facilitate data governance and manage costs.
Tags : 
ibm, back-up, data quality, database management, knowledge and data management, storage management, data management, databases, enterprise software, hardware, information technology, software, storage
    
IBM
Published By: Stratus Technologies     Published Date: Jul 29, 2008
Protect the availability of business-critical processes while keeping costs in line. This e-book takes you from business analysis to design and deployment to an actual case study using recognized industry best practices and governance guidelines.
Tags : 
stratus, best practices, business process, bpm
    
Stratus Technologies
Published By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : 
access control, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
    
Aveksa
Published By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : 
gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold, cloud archiving, storage costs, information governance, archiving, regulatory compliance, information governance, discovery, ediscovery, file shares, managing content, cloud archiving, email retention
    
Proofpoint
Published By: Progress Software BTA Financial     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Telecommunications
Published By: IBM Corporation     Published Date: Apr 26, 2010
Get more out of your information when you need it, and get rid of it when you don't. IBM's Smart Archive strategy will save you time, money and resources with a unified, enterprise-wide approach to archiving and information governance.
Tags : 
ibm filenet, smart archive strategy, data archiving, unify content, archive
    
IBM Corporation
Published By: SAS     Published Date: Jun 27, 2019
In the quest to understand how a therapeutic intervention performs in actual use – in real medical practice outside the controlled environment of clinical trials – many life sciences organizations are stymied. They rely on one-off processes, disconnected tools, costly and redundant data stores, and ad hoc discovery methods. It’s time to standardize real-world data and analytics platforms – to establish much-needed consistency, governance, repeatability, sharing and reuse. The organizations that achieve these goals will formalize their knowledge base and make it scalable, while significantly reducing turnaround times, resources and cost. Learn the seven key components for putting that structure to real-world evidence – and four ways to take it to the next level.
Tags : 
    
SAS
Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com