governance

Results 26 - 50 of 423Sort Results By: Published Date | Title | Company Name
By: Pentaho     Published Date: Nov 04, 2015
Amid unprecedented data growth, how are businesses optimizing their data environments to ensure data governance while creating analytic value? How do they ensure the delivery of trusted and governed data as they integrate data from a variety of sources? If providing appropriately governed data across all your data sources is a concern, or if the delivery of consistent, accurate, and trusted analytic insights with the best blended data is important to you, then don’t miss “Delivering Governed Data For Analytics At Scale,” an August 2015 commissioned study conducted by Forrester Consulting on behalf of Pentaho.
Tags : pentaho, analytics, platforms, big data, predictive analytics, data management, data science
     Pentaho
By: OpenText     Published Date: Mar 13, 2017
Read this AIIM ebook to get a list of action items that will help you make the transition to content services.
Tags : ecm, content services, content marketing, ebook, information governance
     OpenText
By: OpenText     Published Date: Mar 13, 2017
This report from the Information Governance Initiative explores the challenges that five different organizations faced in reaching their information governance goals and how they overcame them.
Tags : ecm, content services, content marketing, ebook, information governance
     OpenText
By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
     Dome9
By: Polycom     Published Date: Sep 04, 2012
Video enables public sector organizations to enable e-governance services and remote judicial applications and crisis management solutions in a richer and more collaborative environment.
Tags : tele-health, enterprise video initiatives, business video applications, healthcare, video, telepresence
     Polycom
By: Iron Mountain     Published Date: Aug 28, 2014
Download this infographic to learn 5 common myths about EMR Transition and enterprise-wide information governance revealed in a survey conducted by Iron Mountain.
Tags : iron mountain, him, health information managers, healthcare technology, information management, healthcare it, emr, emr transition, enterprise-wide information governance, compliance
     Iron Mountain
By: Iron Mountain     Published Date: Aug 28, 2014
The volume of information in the healthcare industry continues to grow exponentially. Meaningful Use, ICD-10, and Accountable Care are all contributing to this data growth. Download this whitepaper to learn how your organization can develop strategies to effectively manage this information throughout its life cycle.
Tags : iron mountain, healthcare information, information governance, information management, healthcare it, hit, data management, electronic information, healthcare roi, business intelligence
     Iron Mountain
By: Iron Mountain     Published Date: Aug 28, 2014
This paper examines a new paradigm for Health Information and Records Management (HIRM) and provides practical guidance to help HIM professionals unwind paper records, offload the burden of low-value production work and lead the transition from traditional records management to an optimized HIRM model.
Tags : iron mountain, health information management, information governance, healthcare it, electronic health records, ehr, him, him professionals, hirm, records management
     Iron Mountain
By: Iron Mountain     Published Date: Aug 28, 2014
This white paper describes findings from the first major survey of information governance practices at healthcare organizations.
Tags : iron mountain, information governance practices, ahima, cohasset associates, healthcare benchmarking, healthcare it, information lifecycle practices, health information management
     Iron Mountain
By: Red Hat Government     Published Date: Jul 21, 2011
Do you have an effective cloud governance plan? This whitepaper guides you through best practices for ensuring your applications and data can safely move between clouds - whether they are private, public or hybrid.
Tags : cloud governance, governance, consistency, portability, consistant, portable, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
     Red Hat Government
By: Red Hat Government     Published Date: Jul 21, 2011
Organizations around the world are benefiting from public clouds. But, when production applications or critical data is involved, it's important to extend on-premise governance to your public or hybrid cloud resources. Effective cloud governance is possible.
Tags : cloud governance, governance, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
     Red Hat Government
By: Red Hat Government     Published Date: Jul 21, 2011
Virtualization and cloud computing are sometimes discussed interchangeably. But gaining the full benefits of cloud computing requires approaches and processes that often aren't in place where ad hoc virtualization is the norm. Join us and learn how to make a smooth transition.
Tags : cloud governance, governance, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
     Red Hat Government
By: Adobe     Published Date: Nov 25, 2013
Without document classification in play, it's impossible to know what to protect. The mobile ecosystem makes workers infinitely more productive, which is one reason that it won’t go away. This white paper explores the question: How can IT govern and protect content in such ad hoc and semi-structured environments? Please download whitepaper to learn more.
Tags : document, document classification, document security, mobile, mobile workforce, cloud-based, mobile, mobile ecosystem, it governance, semi-structured environments, sensitive documents, corporate liabilities, enterprise, enterprise solutions, security
     Adobe
By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : technology, bluecoat, infrastructure
     Blue Coat Systems
By: SAP     Published Date: Nov 12, 2015
The survey conducted by Loudhouse Research of 1,010 executives with responsibility for governance, risk and compliance (GRC) in their organizations found increasing risk and regulation complexity is now the biggest pressure on organizations’ GRC functions.
Tags : risk, risk management, governance risk and compliance, grc, regulation complexity, finance
     SAP
By: Secureworks     Published Date: Nov 11, 2016
To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.
Tags : managed security services, risk management, security, threat and vulnerability management, attacks, insider attacks, cyber security
     Secureworks
By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : integration, developers, open enterprise, api, business, ca technologies
     CA Technologies
By: Oracle     Published Date: Sep 01, 2016
The role of finance is moving from governance to guidance.
Tags : cloud, cloud service, oracle
     Oracle
By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
     Workday Nordics
By: Workday DACH     Published Date: Mar 16, 2018
Erfahren Sie, warum ein neuer Ansatz nötig ist. Lesen Sie das Whitepaper “Ein neuer Ansatz für Audits und Kontrollen in Enterprise-Software” und erfahren Sie mehr über die sich verändernde Kontroll- und Governance-Landschaft. Lesen Sie, wie ein neu definierter Umgang mit Technologie zum Prüfstein für Aufgabentrennung, transparente Geschäftsprozesse und umfassende Audits werden kann. Das Whitepaper liefert Ihnen Antworten auf folgende Fragen: Inwiefern ändern sich die Anforderungen an moderne Finanzlösungen durch neue Kontroll- und Governance-Prozesse? Warum lässt sich mit traditionellen Lösungen und nachträglich hinzugefügten Funktionen zur Finanzkontrolle keine vollständige Compliance erreichen? Wie können technologische Innovationen dazu beitragen, das Finanzmanagement zu transformieren und die Kontrolle zu stärken?
Tags : 
     Workday DACH
By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
     NetIQ
By: IBM     Published Date: Sep 21, 2011
This book provides a practical set of detailed steps to implement an Information Governance program, as well as the associated automation.
Tags : 
     IBM
By: IBM     Published Date: Sep 22, 2011
Companies need capabilities for identifying data assets and relationships, assessing data growth and implementing tiered storage strategies-capabilities that information governance can provide. It is important to classify enterprise data, understand data relationships and define service levels. Database archiving has proven effective in managing continued application data growth especially when it is combined with data discovery.
Tags : ibm, application data, technology, enterprise, database archive
     IBM
By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : aternity, grc, risk management, compliance, end user experience, customer data
     Aternity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com