information management

Results 101 - 125 of 663Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Mar 15, 2016
The richness of the data combined with the increasing interconnectedness of healthcare technologies makes the industry ripe for cyberattacks.
Tags : healthcare, information security, web security, data management, technology, cloud services, security
     Akamai Technologies
By: CA Technologies     Published Date: Jun 26, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
     CA Technologies
By: Druva     Published Date: May 22, 2017
Navigate through today’s data risks with Cloud Information Management. Download now!
Tags : 
     Druva
By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain – or kill-chain – of steps in the process leading to these breaches.
Tags : 
     Exabeam
By: Splunk     Published Date: Aug 21, 2018
SIEM (security information and event management) software offers a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Organizations today require access to analytics-driven SIEMs that combine a big data platform that is optimized for machine data with advanced analytics, threat detection, monitoring tools, incident response tools and multiple forms of threat intelligence. Download your complimentary copy of “The Six Essential Capabilities of an Analytics-Driven SIEM” and learn how to dramatically improve your security posture, advanced threat detection and incident response.
Tags : 
     Splunk
By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
     Splunk
By: HERE Technologies     Published Date: Dec 05, 2018
Car data consumption is critically important to auto manufacturers. As more vehicles are produced with built-in infotainment systems, the cost of supplying them with live information and real-time updates via a data connection grows ever greater. Auto manufacturers need to be able to enhance the driving experience with smart traffic, navigation, and entertainment services, while reducing costs and data volumes. HERE is the world’s leading provider of traffic data to the automotive industry. This eBook shows how HERE optimizes traffic solutions and it outlines how data use modelling, standardization, and good data management can help reduce usage.
Tags : traffic data, auto, location data
     HERE Technologies
By: IBM     Published Date: Apr 14, 2017
The growing need for organizations to treat information as an asset is making metadata management strategic, driving significant growth for metadata management solutions. We evaluate nine vendors to help data and analytics leaders find the solution that best suits the needs of their organization.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection, metadata
     IBM
By: IBM     Published Date: Apr 24, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : cyber crime, security compromise, software management, information security, it management
     IBM
By: EMC Corporation     Published Date: Jul 07, 2013
Forward-looking enterprises know there's more to big data than strong and managing large volumes of information. Big data presents an opportunity to leverage analytics and experiment with all available data to derive value never before possible with traditional business intelligence and data warehouse platforms. Through a modern, big data platform that facilitates self-service and collaborative analytics across all data, organizations become more agile and are able to innovate in new ways.
Tags : enterprises, storage, information management, technology, platform, big data analytics, emc, self service
     EMC Corporation
By: EMC Corporation     Published Date: Jul 07, 2013
Competitive enterprises that embark on big data strategies do so with the expectation that their businesses will transform. They don't just want answers from the data they collect and analyze, they want results. Be it with small, fledgling trials or large, cross-functional efforts, these enterprises want to see clearly how big data can make a difference - with their customers, their processes, their bottom lines and, most important, with growing the business.
Tags : storage, enterprises, information management, technology, platform, big data analytics, emc, self service
     EMC Corporation
By: Workday     Published Date: Jan 10, 2019
Workday Student is an end-to-end student and faculty lifecycle information system that works seamlessly with Workday Financial Management, Workday Human Capital Management, and Workday Grants Management to unite the entire campus under one current, configurable, easy-to-use application.
Tags : 
     Workday
By: VersaSuite     Published Date: Aug 13, 2013
Healthcare providers do not have to live with functionality interruptions and budget strains created by an EHR that does not fit the facility. VersaSuite delivers a customizable EHR/HIS system to streamline the entire range of healthcare business processes.
Tags : ehr, electronic health records, ehr replacement, emr software, emr, electronic medical records, emar, ophthalmology
     VersaSuite
By: VersaSuite     Published Date: Oct 29, 2013
Outpatient Office Implements Electronic Records System Improves Efficiency by 50% and Expands Patient Visits
Tags : ehr, electronic health records, ehr replacement, emr software, emr, electronic medical records, emar, ophthalmology
     VersaSuite
By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
     Intralinks
By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : intralinks, content, security, data, regulatory, information, management
     Intralinks
By: Waterline Data & Research Partners     Published Date: Jun 15, 2015
Information governance and master data management initiatives are complex and require participation from a broad range of enterprise constituents. We focus on five small and innovative vendors that may help information managers reach their information governance and MDM goals.
Tags : vendors, governance, information, mdm, management
     Waterline Data & Research Partners
By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
     Mimecast
By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : intralinks, content, security, data, regulatory, information, management
     Intralinks
By: Jamf     Published Date: Mar 20, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
     Jamf
By: OnBase by Hyland     Published Date: May 17, 2017
IT sprawl can be a serious roadblock to your organization's future success, as disconnected information systems and multiple applications get in the way of overall performance. Instead, put sprawl in its place by thinking like an urban planner. In the complimentary e-book, learn how to manage growth with a master plan that uses a single enterprise information platform.
Tags : sprawl, application, content, information, management, system, cio, hyland
     OnBase by Hyland
By: OnBase by Hyland     Published Date: May 17, 2017
Sprawl isn’t just a problem for cities. IT sprawl can hurt organizations, too. If left unchecked, multiple systems and platforms can cause inefficiency to rise and customer satisfaction to fall. Instead, think like an urban planner and manage growth with a master plan. In this white paper, see how you can put IT sprawl in its place with a single, scalable information management platform.
Tags : sprawl, applications, content, information, management, systems, cio, hyland
     OnBase by Hyland
By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The key challenge is how to “go digital” in the right ways. For most companies, it will be an incremental journey. TodaysGeneralCounsel.com suggests that organisations should focus on a broad enterprise-wide information governance strategy developed by IT, legal, records and business stakeholders. Doing so improves governance, risk management and compliance programs. This best practices paper outlines seven important ways that legal teams can make meaningful progress in their digital transformations." .
Tags : legal, professionals, digital, practices, docusign, esignature
     DocuSign UK
By: Diligent     Published Date: Aug 05, 2016
This whitepaper reveals some of the most commonly asked questions about board portals and how they can help directors and company secretaries be more effective and secure in how they communicate.
Tags : board portals, boardroom, sharing information, information management
     Diligent
By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption
     Teradata
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com