Data ControlWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Control returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Business Intelligence Solutions
 •   Enterprise Content Management (ECM)
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Mobile Device Management
 •   Enterprise Information Integration/ Metadata Management
 •   Application Management and Maintenance
 •   Security Policies
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Data Control Based
 •   Data Control Contact
 •   Data Control Florida
 •   Data Control National
 •   Data Control Summary
 •   Data Improvements
 •   Data Method
 •   Data Monitoring
 •   Mapping Data
 •   Regional Data Control
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

How to Regain IT Control in an Increasingly Mobile World by BlackBerry

July 19, 2012 - (Free Research)
Learn how to balance IT control and the end user experience while managing the data control problem brought on by today's increasingly mobile world in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Database Wars 2.0: Bringing Control To Chaos by Progress

January 30, 2014 - (Free Research)
Organizations could use some help establishing and maintaining control over their valuable information and, ultimately, business success. Access this white paper today to better understand how you can gain data control amidst the incessant chaos. 
(WHITE PAPER) READ ABSTRACT |

DataPrivilege: Entitlement Management Where It Belongs - With Business Owners by Varonis

August 31, 2007 - (Free Research)
In most enterprise business environments the IT personnel controls the permission settings on data; however, they are not as familiar with the information as the original data creator. Find out how you can keep data permission control in the right ... 
(ARTICLE) READ ABSTRACT |

Populating a Data Quality Scorecard with Relevant Metrics by SAS

May 01, 2014 - (Free Research)
The following white paper explores ways to quality data control and measures to support your overall data quality and governance program. Learn what it takes to provide a framework for defining measurement processes and more. 
(WHITE PAPER) READ ABSTRACT |

Keep Your Hard Drive by Dell, Inc.

January 09, 2009 - (Free Research)
The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives. 
(DATA SHEET) READ ABSTRACT |

Market Trends - Secure File Sharing and Collaboration in the Enterprise by Accellion, Inc.

February 04, 2014 - (Free Research)
This report by Forrester Analyst Heidi Shey showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions. 
(WHITE PAPER) READ ABSTRACT |

Enterprises Take Aim at the Cloud for Application Development and Testing by Hewlett-Packard Company

March 31, 2013 - (Free Research)
Access this short resource to discover a converged cloud solution that provides just the type of cloud you need: flexible, reliable, and cost-effective. Built on a common architectural foundation across private, managed, and public clouds, HP delivers the cloud that enterprises rely on. 
(WHITE PAPER) READ ABSTRACT |

Laws, regulations and compliance: Top tips for keeping your data under your control by Sophos, Inc.

December 2008 - (Free Research)
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution. 
(WHITE PAPER) READ ABSTRACT |

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line by BeyondTrust Corporation

February 2009 - (Free Research)
Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation. 
(WHITE PAPER) READ ABSTRACT |

Webinar: 20 Critical Controls for Cyber Defense by ISACA

June 2014 - (Free Research)
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity. 
(WEBCAST) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

How to Gain Visibility and Control of Encrypted SSL Web Sessions by BlueCoat

January 2006 - (Free Research)
Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications. 
(WHITE PAPER) READ ABSTRACT |

Why Choice and Control are Critical to a Successful Cloud Strategy by IBM

June 2012 - (Free Research)
This exclusive whitepaper details the importance of a cloud approach that emphasizes choice and control. 
(WHITE PAPER) READ ABSTRACT |

Essential Enterprise Mobile Security Controls by SearchSecurity.com

January 2013 - (Free Research)
How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data. 
(EGUIDE) READ ABSTRACT |

E-Guide: Wireless LAN access control: Managing users and their devices by SearchSecurity.com

July 2011 - (Free Research)
This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions. 
(EGUIDE) READ ABSTRACT |

Mobile device controls: MDM security features vs. mobile native security by SearchSecurity.com

March 2013 - (Free Research)
When it comes to implementing mobile device management (MDM), not all organizations are the same. Read on to learn how to choose the right approach to MDM for your organization. 
(WHITE PAPER) READ ABSTRACT |

3 undeniable use cases for automated IAM controls by IBM

January 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Reasons to Automate Operating Expense Controls by ExpenseWatch.com

January 2007 - (Free Research)
Manual processes are error-prone, time-consuming and costly. Learn the top ten reasons to automate operating expense controls. 
(WHITE PAPER) READ ABSTRACT |

Optimized Energy Efficiency with Controlled Cold Aisle Containments by Emerson Network Power

May 2014 - (Free Research)
This whitepaper explains why control via temperature may be a considerably better option over pressure control when it comes to increasing power usage efficiency, creating reliability and reducing the impact on IT equipment. 
(WHITE PAPER) READ ABSTRACT |

Executive Guide to SYSPRO Security for Auditing Assurance and Control by SYSPRO

December 2013 - (Free Research)
This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success. 
(WHITE PAPER) READ ABSTRACT |

Definitive Guide to Next Generation Network Access Control by ForeScout Technologies, Inc.

April 2014 - (Free Research)
This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance. 
(WHITE PAPER) READ ABSTRACT |

Meeting Today's Security Challenges with End-to-end Access Control by Juniper Networks, Inc.

March 2008 - (Free Research)
This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution. 
(WHITE PAPER) READ ABSTRACT |

Tackling the Top Five Network Access Control Challenges by Juniper Networks, Inc.

January 2012 - (Free Research)
Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues. 
(WHITE PAPER) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

How to Protect Your Critical Resources with Identity-based Access Control by AEP Networks

April 2008 - (Free Research)
This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts