Controls Data WarehousingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Controls Data Warehousing returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Access Control
 •   Application Security
 •   Data Warehousing
 •   Endpoint Security
 •   Security Monitoring
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Resource Planning (ERP)

Related Searches
 •   Calls Controls Data
 •   Controls Calendars
 •   Controls Data Warehousing B2C
 •   Controls Data Warehousing Claims
 •   Digital Controls
 •   Firms Controls Data
 •   License Controls Data Warehousing
 •   Proposal Controls
 •   Protocol Controls Data Warehousing
 •   Requirements Controls Data
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Controlling Data Growth and Managing Complexity in Oracle Environments with Virtual Databases by Delphix

May 20, 2011 - (Free Research)
IDC claims that "development and test databases remain an area of astonishing waste in terms of both storage and staffing costs at many organizations." Delphix provides a simple and effective way to overcome these obstacles. 
(ANALYST BRIEF) READ ABSTRACT |

Presentation Transcript: Surviving the Tidal Wave of Data with a Holistic Approach to Data Reduction by IBM Rational

January 24, 2011 - (Free Research)
This presentation transcript reviews the options and trends for controlling data growth by reducing your data storage footprint. Milan K. Patel, Sr. Marketing Manager for Tivoli Storage contributes thoughts on how IBM can help you achieve your data reduction goals. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Manage Enterprise Data with Integrated Data Management White Paper by IBM

March 24, 2010 - (Free Research)
Adopting an Integrated Data Management strategy can be a highly effective way to help IT support business growth, facilitate data governance and manage costs. It is also key to helping ensure that the enterprise derives maximum competitive advantage from its data. 
(WHITE PAPER) READ ABSTRACT |

Simplifying and Optimizing IT - Dell Helps Control Data Center TCO by Dell, Inc.

March 30, 2009 - (Free Research)
The data center of every business, whether SMB or enterprise, needs to find its own sense of balance between simplification and optimization that needs to be attained in order to lower the total cost of ownership (TCO) of the enterprise information technology (I.T.) infrastructure. To learn how Dell can lower the TCO of your data center, read on. 
(ANALYST REPORT) READ ABSTRACT |

Smarter Data Management - Controlling Data Growth by IBM

April 06, 2011 - (Free Research)
Data growth is one of the most significant challenges – and opportunities - facing organizations today. New forms of data, the retention of additional detail for analysis, increasing pressure for high availability of more of the data, regulatory and security. 
(VIDEO) READ ABSTRACT |

Controlling data traffic and energy costs through consolidation by Dell, Inc. and Intel®

September 10, 2012 - (Free Research)
Access this exclusive resource to learn how your business can develop a vPOD architecture to increase agility while dramatically reducing costs. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Green Storage Best Practices Control Costs, Increase Energy Efficiency by IBM

December 22, 2010 - (Free Research)
This tip guide will explain that by implementing the green storage best practices presented in this paper, firms can use a mixture of technologies and tactics to control data center power and cooling costs and increase their storage energy efficiency. 
(EGUIDE) READ ABSTRACT |

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.

March 24, 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT)

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.

March 24, 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT) READ ABSTRACT |

GRC Solutions from itelligence: Balance Risk And Opportunity With A Practical Approach to GRC by itelligence, Inc.

May 15, 2013 - (Free Research)
To keep pace in today's constantly evolving regulatory environment, you need a comprehensive governance, risk, and compliance (GRC) system. This brief white paper highlights how the right GRC strategy can help you standardize business process and increase control over compliance issues. 
(WHITE PAPER) READ ABSTRACT |

CCNA Review: Understand What Types of Information Will be Required to Pass the CCNA Test by Global Knowledge Network, Inc.

April 2005 - (Free Research)
This document is part of the Global Knowledge Course Review Series, and the review contained will help you understand which types of information the CCNA certification exam covers. 
(WHITE PAPER) READ ABSTRACT |

Internal controls checklist for corporate data protection, compliance by Novell, Inc.

May 2011 - (Free Research)
In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection. 
(EGUIDE) READ ABSTRACT |

Closing the Gaps in Root Access Control by BeyondTrust Corporation

May 2009 - (Free Research)
Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

When millions need access: Identity management in an increasingly connected world by IBM

January 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

7 Key Reasons to Implement an Identity Aware Network by Applied Identity

March 2008 - (Free Research)
This paper provides you with insight into the seven key reasons why internal networks are migrating towards an identity and role based infrastructure to provide a more effective and cost efficient method for securing critical business assets. 
(WHITE PAPER) READ ABSTRACT |

Customers Discuss Oracle Database Security by Oracle Corporation

May 2012 - (Free Research)
<p>Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.</p> 
(WEBCAST) READ ABSTRACT |

10 Cool Things Your Firewall Should Do by SonicWALL

November 2008 - (Free Research)
This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall. 
(WHITE PAPER) READ ABSTRACT |

Internal Controls Checklist for Corporate Data Protection and Compliance by Tripwire, Inc.

May 2011 - (Free Research)
In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection. 
(EGUIDE) READ ABSTRACT |

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind by CDW Corporation

March 2009 - (Free Research)
Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security. 
(WHITE PAPER) READ ABSTRACT |

CA Technology Brief: CA Point of View: Content Aware Identity & Access Management by CA Technologies.

March 2011 - (Free Research)
Discover a new model of identity systems that help you handle the growing complexities within your IT infrastructure. Learn how CA Content-Aware IAM goes beyond traditional IAM techniques, improving your compliance posture and protecting your critical information assets. 
(WHITE PAPER) READ ABSTRACT |

Where to Go Once Your Servers Are Virtualized by Global Knowledge

April 2014 - (Free Research)
This whitepaper breaks down four options you can implement after you have fully virtualized your data center. 
(WHITE PAPER) READ ABSTRACT |

eBook: Private Cloud Application Opportunities: Exploring Benefits, Challenges of Using Private Cloud by IBM

December 2012 - (Free Research)
In this e-book, discover how your organization can determine whether software as a service (SaaS), a public cloud infrastructure, or a private cloud is best for you. 
(EBOOK) READ ABSTRACT |

Portal Authentication: A Balancing Act Between Security, Usability & Compliance by PistolStar, Inc.

August 2009 - (Free Research)
This white paper discusses the problems with current authentication systems and the drivers that should be motivating organizations of all sizes to improve their access controls. 
(WHITE PAPER) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Amcor Injects Performance into Warehousing by Apriso Corporation

December 2010 - (Free Research)
Read this brief case study to learn how one of the top three packaging companies in the world leveraged an innovative, integrated approach to improve their product quality, execute Lean processes, manage their packaging operations, and improve their operations performance. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts