Data Management White Papers

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.

Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management
Results 1 - 25 of 3156Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 23, 2015

Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.

Tags : it trends, it environments, smarter physical infrastructures, data protection, it management, knowledge management, enterprise applications, data management
    
By: IBM     Published Date: Jan 23, 2015

Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Watch this webinar to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.

Tags : storage environment, cloud storage, it efficiency, cloud agility, data-driven analytics, it management, knowledge management, enterprise applications
    
By: Verisign     Published Date: Jan 22, 2015

As a leader in domain management and internet security, Verisign’s network supports more than 82 billion transactions on a daily basis, enabling nearly 50 percent of the internet’s domains. Building networks to survive the largest DDoS attacks on the internet is part of Verisign’s heritage, and Verisign has been using DDoS mitigation techniques for more than 16 years while protecting the .com and .net infrastructures. This gives Verisign the ability to flex its entire 1+ tbps infrastructure as needed in real-time response to attack scenarios against itself and its customers.

Tags : network capabilities, ddos attack mitigation, domain management, internet security, it infrastructure, internet domains, it management, enterprise applications
    
By: Verisign     Published Date: Jan 22, 2015

The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. It represents a unique view into the attack trends unfolding online for the previous quarter, including attack statistics, DDoS malicious code analysis and behavioral trends

Tags : service trends report, ddos, security research, it security analytics, ssdp vulnerability, security, it management, data management
    
By: Verisign     Published Date: Jan 22, 2015

Cyber security threats have become more pervasive and damaging than ever, ranging from advanced persistent threats to massive distributed denial of service (DDoS) attacks. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network even as zero-day threats emerge and known threats evolve.

Tags : ddos protection, cyber security threats, cloud-based protection, best practices, security, it management, enterprise applications, data management
    
By: Verisign     Published Date: Jan 22, 2015

Versign OpenHybridTM is a Verisign DDoS Protection Services architecture that enables interoperability between on-premise and cloud-based platforms. An easy to use tool (Open API), allows customers to leverage existing security perimeter devices to signal threat information to the Verisign DDoS protection cloud, when the capabilities of the device are exceeded. Verisign OpenHybrid™ can also be applied to monitor and protect services hosted within other public and private cloud services.

Tags : api specification, cloud signaling, ddos attacks, threat visibility, risk mitigation, security, it management, knowledge management
    
By: CareCloud     Published Date: Jan 21, 2015

Watch this on-demand webinar to learn how one scenario can help get the most from its PM and EHR.

Tags : carecloud, pm and ehr, boost revenue, ehr too expensive, practice ehr, revenue cycle management, ehr installation, system implementation
    
By: Dell     Published Date: Jan 21, 2015

Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.

Tags : dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure, infrastructure, storage virtualization, disaster recovery
    
By: SugarCRM     Published Date: Jan 20, 2015

After an initial rollout to more than 45,000 sales users, IBM wanted even greater insights. Thanks to the high usability of Sugar, IBM was able to increase sales data quality - which has gone on to power predictive sales analytics. Learn how IBM and SugarCRM are driving more effective sales teams.

Tags : sales analytics, data quality, sales, high usability, enterprise applications, data management
    
By: Cisco     Published Date: Jan 15, 2015

Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.

Tags : firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation
    
By: Cisco     Published Date: Jan 15, 2015

Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.

Tags : comparitive analysis, datacenter, social, analytics, security, data management
    
By: Cisco     Published Date: Jan 15, 2015

In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.

Tags : operating costs, capital, threat detection, visibility, networks, computing, cloud, innovation
    
By: Cisco     Published Date: Jan 15, 2015

For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.

Tags : attacks, viruses, protection, networks, threats, arms race, vulnerabilities, macroviruses
    
By: Comcast     Published Date: Jan 15, 2015

For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: Comcast     Published Date: Jan 15, 2015

Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: Comcast     Published Date: Jan 15, 2015

It’s the challenge businesses of every size wrestle with: How to improve employee productivity while driving down costs. Technology can help achieve that goal – when the right tools are used.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: IBM     Published Date: Jan 14, 2015

Cloud-delivered big data analytics presents an enormous opportunity for organizations that want to become more agile, more efficient and more competitive. To capitalize on the full potential of this opportunity, businesses need cloud-enabled big data analysis solutions that are flexible, simple, secure and open.

Tags : big data, data management, the cloud, cloud solutions, data, data analytics, client engagement, computing model
    
By: IBM     Published Date: Jan 14, 2015

Decision makers need data and they need it now. As the pace of business continues to accelerate, organizations are leaning heavily on data warehouses to deliver analytical grist for the mill of daily decisions. This Research Report from Aberdeen Group examines the benefits of data warehouse solutions that offer rapid information delivery while minimizing complexity for users and IT.

Tags : aberdeen group, data warehouse, data center, data management, analytic tools, collaboration, data trust, data analytics
    
By: IBM     Published Date: Jan 14, 2015

Big data has been big news in recent years. Organizations recognize that they must now begin to focus on using big data technologies to solve business problems. The pressure is on for organizations to move past the discussion phase toward well-planned projects.

Tags : big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
By: IBM     Published Date: Jan 14, 2015

Bloor Research investigated several key critical success factors for big data analytics. Their findings show that governance, data cleansing, and privacy and security have never been more important. Read this paper to see their conclusions.

Tags : big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
By: IBM     Published Date: Jan 14, 2015

Explore this interactive infographic to discover how IBM makes it possible to manage all of these priorities while significantly reducing storage and maintenance costs.

Tags : big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
By: CDW     Published Date: Jan 14, 2015

Learn why teams and fans love the benefits a stadium network upgrade can bring and see what your organization should do to capitalize on these business advantages.

Tags : network, upgrade, business advantages, benefits, networking, data management
    
By: Dyn     Published Date: Jan 14, 2015

Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.

Tags : cloud based, dns service, ddos attack, user experience, infrastructure, dns performace, ddos, business intelligence
    
By: IBM     Published Date: Jan 09, 2015

Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation with a proactive, business-centric approach to BCM that highlights critical practices.

Tags : business continuity management, risk management, bcm plan, business solutions, it management, knowledge management, platforms, data management
    
By: IBM     Published Date: Jan 09, 2015

Every organization must put a plan in place for recoverability after an outage, but testing your enterprise resilience without full business and IT validation is ineffective. Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading; understand why validating resilience demands involvement from IT and the business; and get details on the checks and balances you need to maintain and validate business resilience.

Tags : resiliency testing, it validation, business resilience, small-scale recovery simulations, it management, knowledge management, enterprise applications, data management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.