Guide InformationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Guide Information returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Fraud Detection & Prevention
 •   Enterprise Information Integration/ Metadata Management
 •   Intellectual Property Protection/ Extrusion Prevention
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Information Lifecycle Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis

Related Searches
 •   Guide Codes
 •   Guide Information Buys
 •   Guide Information Facts
 •   Guide Information Making
 •   Guide Information Policies
 •   Java Guide
 •   Layer Guide Information
 •   Managers Guide Information
 •   Operations Guide
 •   Pos Guide Information
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

E-Guide: Information Security Essential Guide to Compliance by Information Security Magazine

July 06, 2010 - (Free Research)
Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The new world of archiving by IBM

December 20, 2011 - (Free Research)
In this e-guide, industry expert Bill Inmon provides insight for needs with archival data in a modern and effective world. 
(EGUIDE) READ ABSTRACT |

Computer Weekly Buyers' Guide: Cloud Computing by SearchDataCenter.com

January 19, 2011 - (Free Research)
This seven-page Buyer’s Guide to Cloud Computing by Computer Weekly journalists details the kinds of cloud offering that CIOs and senior IT professionals will need to take into account as they plan future outsourcing, hosting and application strategies. 
(ESSENTIAL GUIDE) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 30, 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

Tip Guide: Creating an effective enterprise information management program by IBM

November 22, 2011 - (Free Research)
In this brief e-guide, you will learn tips to manage the entire lifecycle of both structured and unstructured information, keys to effective EIM deployment, best practices to optimize the business value of successful data management processes and more. 
(EGUIDE) READ ABSTRACT |

E-Guide: GARP and How it Helps you Achieve Better Information Governance by IBM

March 22, 2011 - (Free Research)
This e-guide answers the most frequently asked questions about information governance and GARP. Continue reading to get a firm introduction to GARP and information governance as a whole. 
(EGUIDE) READ ABSTRACT |

eGuide: Essential Guide to Identity & Access Management by Information Security Magazine

May 29, 2009 - (Free Research)
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more. 
(EGUIDE) READ ABSTRACT |

SearchBusinessAnalytics.com Tip Guide: Advanced analytics key component for ‘decision management systems’ by Sybase, an SAP company

March 23, 2012 - (Free Research)
This tip guide offers an explanation from industry expert James Taylor as to why every customer should not be treated the same in today's ever-evolving business environment. Taylor details why decision management systems involving automation are essential to making successful strategic and operational decisions that please your customers. 
(EGUIDE) READ ABSTRACT |

SearchBusinessAnalytics.com Tip Guide: IT, BI pros share their secrets to ‘big data’ analytics success by Sybase, an SAP company

March 23, 2012 - (Free Research)
Think big. That's just one secretive tidbit on effectively handling big data analytics offered up by IT professionals in this expert e-guide. Read this resource now and learn why solid system planning, business-user involvement and a clearly thought-out deployment strategy are all necessary components to a sound big data analytics initiative. 
(EGUIDE) READ ABSTRACT |

E-Guide ECM and Information Governance by OpenText

April 06, 2012 - (Free Research)
This expert e-guide looks at the importance of governance in enterprise content management (ECM) initiatives and provides suggestions for structuring and managing a sound policy. 
(EGUIDE) READ ABSTRACT |

Manufacturing ERP Buyer’s Guide by ECi Software Solutions - M1 ERP System for Manufacturers

December 12, 2011 - (Free Research)
Inside this guide, you’ll find information about most of the major vendors that offer enterprise resource planning (ERP) software for manufacturers. 
(EGUIDE) READ ABSTRACT |

Buyer’s Guide to Antimalware by Panda Security

October 27, 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

A Guide to Virtualizing Your Information Infrastructure by EMC Corporation

April 2008 - (Free Research)
Virtualization is top priority for CIOs and data center managers. Download this guide on virtualization and discover an approach that distributes intelligence across all levels, while centralizing the control and management of your entire environment. 
(WHITE PAPER) READ ABSTRACT |

Setting the Stage for the Data Governance: A CIO's Guide by IBM

August 2013 - (Free Research)
In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age. 
(EGUIDE) READ ABSTRACT |

Tip Guide: The top ten enterprise information management mistake to avoid by IBM

November 2011 - (Free Research)
In this tip guide, David Marco, a well-known data management consultant, author and the president of Enterprise Warehousing Solutions Inc., outlines what he defines as the top 10 most common mistakes to avoid when implementing and maintaining an EIM program. 
(EGUIDE) READ ABSTRACT |

E-Guide: Align Data Protection with Business Importance by IBM

August 2011 - (Free Research)
This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

CW buyer's guide: context-aware security by ComputerWeekly.com

April 2013 - (Free Research)
This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Dell Networking S5000: Switch Configuration Guide for EqualLogic SANs by Dell, Inc.

August 2013 - (Free Research)
This informative guide walks users through the process of configuring Dell™ Networking S5000 switches for use with EqualLogic™ PS Series storage. 
(WHITE PAPER) READ ABSTRACT |

Information Security Essential Guide: The Evolution of Threat Detection and Management by SearchSecurity.com

May 2013 - (Free Research)
This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime. 
(ESSENTIAL GUIDE) READ ABSTRACT |

E-Guide: Securing the SIEM system: Control access, prioritize availability by SearchSecurity.com

February 2012 - (Free Research)
Given the vital role a security information and event management (SIEM) system plays in an organization’s security infrastructure, a compromised or crashed system can mean devastating consequences. This e-guide explores the serious implications of a corrupted SIEM system and offers helpful tips on how to secure them. 
(EGUIDE) READ ABSTRACT |

Information Security Essential Guide: Strategies for Tackling BYOD by SearchSecurity.com

May 2013 - (Free Research)
Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on SIM: Moving beyond network security toward protecting applications by SearchSecurity.com

December 2011 - (Free Research)
SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs. 
(EGUIDE) READ ABSTRACT |

E-Guide: Bringing Value to Application Monitoring Through SIM by SearchSecurity.com

December 2012 - (Free Research)
This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now. 
(EGUIDE) READ ABSTRACT |

E-Guide: Balancing compliance with information security threat assessment by SearchSecurity.com

November 2011 - (Free Research)
Implementing the rules and regulations of a specific industry can be difficult, making it hard for companies to accomplish the task at hand: being successful. In this expert E-Guide, you will learn that the hassle of compliance is worth it in the long run for your company and can be worked into your everyday culture. 
(EGUIDE) READ ABSTRACT |

Collaboration: RFP Technology Decisions Guide by SearchSecurity.com

May 2012 - (Free Research)
Part two of SearchUnifiedCommunications.com's three-part guide on collaboration products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the process. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts