Information CorporationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Corporation returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Disk-based Backup & Storage/ RAID
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Business Process Management (BPM)
 •   Storage Security
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Data Center Management

Related Searches
 •   Graphs Information Corporation
 •   Information Agency
 •   Information Corporation Consults
 •   Information Corporation E-Commerce
 •   Information Corporation Manual
 •   Information Corporation Processing
 •   Information Corporation Schemas
 •   Information International
 •   Information Operations
 •   Planner Information Corporation
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Best Practices in Information Governance & Compliance by RSD

October 03, 2011 - (Free Research)
Access this exclusive newsletter on best practices and tips of information governance with articles from leaders in enterprise technology. 
(NEWSLETTER) READ ABSTRACT |

The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing eDiscovery and Compliance Obligations with IT Operational and Budget Constraints by Iron Mountain

March 01, 2010 - (Free Research)
This IDC White Paper discusses the practical approaches the IT organization must consider so that it can effectively execute on the corporation's compliance and eDiscovery objectives while still meeting the IT organization's budget, application performance, and service-level objectives. 
(ANALYST REPORT) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 15, 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

Information Management with Oracle Database 11g Release 2 by Oracle Corporation UK Ltd

October 03, 2011 - (Free Research)
In this white paper, learn how to improve your information management, increasing the ability to manage, secure, query, and administer information with high levels of performance. Uncover how Oracle Database 11g Release 2 includes a wide range of capabilities to allow for this intelligent management and analysis. 
(WHITE PAPER) READ ABSTRACT |

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk by Symantec Corporation

July 2008 - (Free Research)
This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance. 
(BOOK) READ ABSTRACT |

Multi-Modal Learning by SkillSoft Corporation

Multi-Modal Learning™, from SkillSoft Corporation, represents a powerful new web-based solution that significantly enhances learning and day-to-day productivity for business professionals in their use of core desktop software technologies. 
(SOFTWARE PRODUCT)

CCNA Review: Understand What Types of Information Will be Required to Pass the CCNA Test by Global Knowledge Network, Inc.

April 2005 - (Free Research)
This document is part of the Global Knowledge Course Review Series, and the review contained will help you understand which types of information the CCNA certification exam covers. 
(WHITE PAPER) READ ABSTRACT |

Information security for SMEs by ComputerWeekly.com

May 2014 - (Free Research)
In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs. 
(ESSENTIAL GUIDE) READ ABSTRACT |

February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment” by Information Security Magazine

January 2011 - (Free Research)
This month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation. 
(EGUIDE) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

Data Deduplication Background: A Technical White Paper by Quantum Corporation

March 2011 - (Free Research)
The purpose of data deduplication is to increase the amount of information that can be stored on disk arrays and to increase the effective amount of data that can be transmitted over networks. Read this white paper from Quantum Corporation to learn more about data deduplication today. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Presentation Transcript: EMC Corporation and the Benefits of Network Attached Storage for Small Businesses by EMC Corporation

July 2009 - (Free Research)
The presentation transcript from EMC Corporation features Ashish Nadkarni, Principal Consultant with GlassHouse Technologies, discussing the benefits of Network Attached Storage for Small Businesses. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Information Management: The First Step in the Right Direction by Symantec Corporation

March 2011 - (Free Research)
This white paper from Symantec Corporation takes an in-depth look into some of the information management strategies companies are using today, and the inefficiencies inherent in them. Read on to learn more about what your company can accomplish in the data center through e-discovery events. 
(WHITE PAPER) READ ABSTRACT |

Moving Beyond People Glue and Silos by IBM

June 2013 - (Free Research)
This quick video outlines why replacing this "people glue" strategy with reliable, repeatable systems and processes that break siloes and meet the needs of multiple users across the organization is critical to interlinking success and truly achieving information governance. 
(VIDEO) READ ABSTRACT |

Securing Sensitive Information: An Examination of Information Security Issues, Methods and Securing Data With LTO-4 Tape Drive Encryption by Hewlett-Packard Company

July 2009 - (Free Research)
Each month many companies, big or small, well known or unknown, experience a data security loss with the potential exposure of thousands to millions of sensitive customer or employee records. This brief examines cryptographic methods, specifically tape data encryption, to combat such security losses. 
(ANALYST BRIEF) READ ABSTRACT |

Five Keys to Preventing Data Corruption in Storage Environments by StorageCraft Technology Corporation

February 2011 - (Free Research)
The lifeblood of a corporation is in the information that it generates and stores. Due to the increasing amount of data and information that an organization must protect, robust computer systems are essential for survival. Read this white paper to learn about the 5 keys to preventing data corruption in your storage system. 
(WHITE PAPER) READ ABSTRACT |

Cost-Effective Document Management Solutions for Business-Critical Processes - Part I: Why a New Generation of Enterprise Content Management Solutions Are Emerging to Meet the Need for Secure Document Exchange by IntraLinks, Inc

March 2009 - (Free Research)
This is Part I of a white paper series that examines online workspaces, a type of enterprise content management solution delivered in a Software-as-a-Service model. This paper provides an overview of online workspaces as an alternative to current document management methods. 
(WHITE PAPER) READ ABSTRACT |

Case Study - Depository Trust and Clearing Group by Riverbed Technology, Inc.

May 2011 - (Free Research)
The Depository Trust and Clearing Corporation needed greater visibility into how disparate network systems were working together. In this case study, learn how they were able to achieve end-to-end application visibility and gain strategic tips for your own business. 
(CASE STUDY) READ ABSTRACT |

Risk Management for Cloud Computing by SearchCIO.com

February 2013 - (Free Research)
This expert resource provides in-depth insight and risk management advice for IT leaders looking to benefit from the cloud. Read now for 20 questions that should be asked of every cloud provider, as well as well as advice for creating harmony between compliance and information security functions, and much more. 
(WHITE PAPER) READ ABSTRACT |

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic” by Information Security Magazine

March 2011 - (Free Research)
This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology. 
(EZINE)

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

Distributed Data Capture: Reducing the Cost of Remote Business Processes by Kofax, Inc.

March 2011 - (Free Research)
In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process. 
(WHITE PAPER) READ ABSTRACT |

E-Book: NERC Compliance by SearchSecurity.com

September 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation. 
(EBOOK) READ ABSTRACT |

NYISO Shines the Spotlight on Mission-Critical Data with Enterprise RTView by SL Corporation

February 2008 - (Free Research)
More than 60,000 mission-critical applications already rely on Enterprise RTView's underlying SL-GMS technology to deliver customized displays and powerful dynamic visualization technology. 
(CASE STUDY) READ ABSTRACT |

UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by RSA, The Security Division of EMC

March 2012 - (Free Research)
Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts