Assessing InformationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Assessing Information returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Information Integration/ Metadata Management
 •   Business Intelligence Solutions
 •   Data Security
 •   Business Process Management (BPM)
 •   Data Quality
 •   Disaster Recovery
 •   Backup Systems and Services
 •   Data Center Management
 •   Application Management and Maintenance
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Assessing Consultants
 •   Assessing Information White Papers
 •   Assessing Matrix
 •   Assessing Request
 •   Assessing Tutorials
 •   Company Assessing
 •   Design Assessing Information
 •   Monitor Assessing
 •   Standards Assessing Information
 •   Summary Assessing
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

eGuide: Effective enterprise information management: Key strategies and mistakes to avoid by IBM

November 17, 2011 - (Free Research)
In this informative e-guide you will learn the initial steps to launching an EIM program, how to assess current data governance, quality management, master data management and architecture to ensure EIM success, the best practices for determining the best business opportunities and more. 
(EGUIDE) READ ABSTRACT |

Information Quality Management (IQM): Assessing Your IQM Practice by Harte-Hanks Trillium Software

March 17, 2011 - (Free Research)
Organizations are starting to see the connection between making information available and leveraging it to be more agile and productive. This paper offers a practical guide to assess your information quality maturity level, and provides a framework to align information quality management practices to business objectives and results. 
(WHITE PAPER) READ ABSTRACT |

Disaster Recovery 101: Assessing Risk & Preventing Human-made Disasters by QuorumLabs

December 29, 2011 - (Free Research)
This SearchDisasterRecovery.com E-Guide will provide you with the necessary steps for evaluating risk in you DR plan, and offer insight into the high-level threats you need to watch out for today. Read on for a deep dive into the risk evaluation process, information on preventing human-made disasters and more. 
(EGUIDE) READ ABSTRACT |

Outsourcing the problem of software security by ComputerWeekly.com

July 10, 2012 - (Free Research)
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. 
(ANALYST REPORT) READ ABSTRACT |

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 25, 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

Assessing the Total Cost of Ownership for BI by LogiXML

January 31, 2012 - (Free Research)
This report provides mid-market organizations a framework for evaluating the total cost of ownership (TCO) of business intelligence (BI) solutions. 
(WHITE PAPER) READ ABSTRACT |

An Information Architecture Vision by ComputerWeekly.com

June 07, 2013 - (Free Research)
The Open Group assesses the "big data" problem and offers an Enterprise Information Planning and Architecture Model to help organisations make the most of their information. 
(ESSENTIAL GUIDE) READ ABSTRACT |

eGuide: Assessing open source BI and BI technologies for the midmarket by Jaspersoft

December 28, 2011 - (Free Research)
In this e-guide, readers will learn business intelligence (BI) tips for small to mid-sized organizations. 
(EGUIDE) READ ABSTRACT |

Secure Search: Balancing Security with the Need for Information Access by EMC Corporation

May 01, 2008 - (Free Research)
This white paper summarizes the issues of secure search for large organizations and explores the pros and cons of traditional enterprise search versus federated search. 
(WHITE PAPER) READ ABSTRACT |

The Education Edge: School Administration Software by Blackbaud

This complete solution was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information. 
(SOFTWARE PRODUCT)

Enabling business agility through real-time process visibility by IBM

April 12, 2012 - (Free Research)
Read this brief paper to learn about a platform that offers end-to-end visibility while transactions are in process. Learn how a customizable, operational dashboard enables real-time visibility into the overall state of operations and transactions across disparate systems and applications. 
(WHITE PAPER) READ ABSTRACT |

Eight Tips to Safeguard Your Business Information by Iron Mountain

October 11, 2013 - (Free Research)
Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips. 
(WHITE PAPER) READ ABSTRACT |

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.

July 2008 - (Free Research)
In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. 
(WHITE PAPER) READ ABSTRACT |

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk by Symantec Corporation

July 2008 - (Free Research)
This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance. 
(BOOK) READ ABSTRACT |

Computer Weekly – 20 November 2012: Inside the £65m datacentre supporting Tesco's online strategy by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we visit the £65m datacentre that sits at the heart of Tesco's ambitious online strategy. Government has approved the iPhone for use by Whitehall officials – we assess the risks. And the CIO at British Gas talks about how IT transformed the firm's customer service. Read the issue now. 
(EZINE) READ ABSTRACT |

2011–2012 IT Budget Benchmarks by ComputerWeekly.com

November 2011 - (Free Research)
The Corporate Executive Board IT Budget Benchmarking Survey assess IT spending,  staffing, and outsourcing levels at more than 175 organizations globally, representing roughly US$38 billion in IT spend. Download for the latest IT budget trends. 
(IT BRIEFING) READ ABSTRACT |

e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks by SearchSecurity.com

June 2011 - (Free Research)
Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them. 
(EGUIDE) READ ABSTRACT |

Eight Tips to Safeguard Your Business Information by Iron Mountain

July 2013 - (Free Research)
This short white paper explores 8 tips for safeguarding your business information in today's day and age. 
(WHITE PAPER) READ ABSTRACT |

SIEM IT Decision Center- Checklist #2 by SearchSecurity.com

February 2013 - (Free Research)
This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward. 
(EGUIDE) READ ABSTRACT |

Seeing the Big Picture: A Corporate Guide to Better Decisions through IT by SAP America, Inc.

September 2009 - (Free Research)
Executives at small and midsize companies are making critical business decisions every day based on the information available to them. This information can come from a variety of sources: opinions from peers and colleagues; a personal sense of intuition or business judgment; or data derived internally or externally to the organisation. 
(WHITE PAPER) READ ABSTRACT |

Protecting Vital Business Interests with a Simplified Storage Solution by Dell, Inc.

November 2011 - (Free Research)
Data growth and regulatory requirements have made backup, recovery, and archiving critical aspects of enterprise operations. Dell Services experts can assess how effectively an information infrastructure is getting the job done and deploy integrated, best-of-breed storage solutions to help ensure the safety and recoverability of critical data. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Next-Generation Backup, Recovery, and Archive by EMC Corporation

March 2008 - (Free Research)
EMC provides a range of professional services for assessing, implementing, and managing a backup, recovery, and archive environment. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Stuff Happens - How to Assess Risks and Set Objectives for Business Continuity Plans by Marathon Technologies

April 2010 - (Free Research)
Disaster recovery (DR) plans become more complicated and difficult when businesses try to identify all risk scenarios and assign quantitative value to the likelihood of them happening. This transcript will guide you through the process of determining what needs to be protected within your business data and infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Trends in Enterprise Mobility by ComputerWeekly.com

April 2013 - (Free Research)
This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working. 
(WHITE PAPER) READ ABSTRACT |

CW Buyer's Guide: infrastructure on demand by ComputerWeekly.com

November 2012 - (Free Research)
This 10 page Computer Weekly Buyer's Guide offers advice for organisations looking at infrastructure on demand in the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts