Information FindWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Find returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Materials Compliance Management Solutions
 •   Modeling and Visualization
 •   Data Center Management
 •   Network Security

Related Searches
 •   Information Buy
 •   Information Companies
 •   Information Find Cycles
 •   Information Find Evaluation
 •   Information Package
 •   Payment Information
 •   Reports Information
 •   Scheduling Information Find
 •   Sheets Information Find
 •   View Information
Advertisement

ALL RESULTS
1 - 25 of 464 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 24, 2009 - (Free Research)
What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements. 
(PODCAST) READ ABSTRACT |

To Pump up Data Volume, Connect Customer Channels by SearchCRM

December 10, 2013 - (Free Research)
In this chapter of our e-book series Improving the Customer Experience Through Technology, CRM professionals explain what it takes to maintain a single view of a customer's history and contact information, how multichannel organizations keep all that data in order -- and how they keep it from falling into the wrong hands. 
(EGUIDE) READ ABSTRACT |

Drive Performance by Giving Business Users Faster, Better Data Visualization Tools Anyone Can Use by SAS

July 31, 2013 - (Free Research)
Data is pouring in from every direction for organizations today, and many struggle to manage the volume. It's structured and unstructured, messy and overwhelming. If it's managed correctly, the flood of data can provide organizations with invaluable information. Find out how to improve business decisions by reading this resource now. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 30, 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

Information Optimization Transformation Experience Workshop by Hewlett-Packard Limited

January 24, 2013 - (Free Research)
Many organizations continue to struggle with basic BI competencies, such as information quality, data integration, governance, and accessibility. Read on to learn how you can benefit from an online Big Data workshop where your business and IT leaders can collaborate on the latest strategies and trends about strategic information management. 
(WHITE PAPER) READ ABSTRACT |

Kognitio delivers for ScottishPower by Kognitio

June 10, 2013 - (Free Research)
Find out how a company working toward dominance as a multi-utility supplier can achieve effective customer relationship management (CRM.) This resource explores how one company found a way to scan millions of rows of information in seconds to utilize and interpret valuable information. 
(WHITE PAPER) READ ABSTRACT |

The Executive Guide to Data Loss Prevention by Websense, Inc.

August 18, 2009 - (Free Research)
Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs. 
(WHITE PAPER) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 26, 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Information Optimization Transformation Experience Workshop by Hewlett-Packard Company

April 12, 2013 - (Free Research)
Many organizations continue to struggle with basic BI competencies, such as information quality, data integration, governance, and accessibility. Read on to learn how you can benefit from an online Big Data workshop where your business and IT leaders can collaborate on the latest strategies and trends about strategic information management. 
(WHITE PAPER) READ ABSTRACT |

Connecting Through Content, Issue Two by KnowledgeStorm, Inc (E-mail this company)

May 21, 2007 - (Free Research)
Connecting Through Content, Issue Two examines how technology buyers search for content and how marketers deliver content to them. Content distribution channels, user search techniques, content registration behavior and other aspects of content distribution and syndication are evaluated. 
(ANALYST REPORT) READ ABSTRACT |

Business Outcomes from Big Data by ComputerWeekly.com

April 10, 2013 - (Free Research)
This research study from CEB evaluates the CIO's role in making big data attainable and useful for the business. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

July 24, 2012 - (Free Research)
This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. by dataguise, Inc.

June 01, 2010 - (Free Research)
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Improve Organizational Communications by Cisco Systems, Inc.

October 28, 2011 - (Free Research)
As an organization’s workforce becomes increasingly mobile and dispersed, its ability to survive and thrive depends on effective employee communications. Learn about a collaboration platform that allows for improved employee communication and productivity. 
(WHITE PAPER)

Improve Organizational Communications to Drive Business Results by Cisco Systems, Inc.

October 21, 2011 - (Free Research)
As an organization’s workforce becomes increasingly mobile and dispersed, its ability to survive and thrive depends on effective employee communications. Access this resource to learn about collaborative tools that enable increased productivity, business agility and competitive advantage. 
(WHITE PAPER)

Datalink's White Paper Library by Datalink Corp

May 06, 2010 - (Free Research)
Welcome to Datalink’s White Paper library. Inside you will find valuable data expertise - from an objective perspective. Here, you can find the information about the latest storage trends, relevant data topics, and new strategies to store, manage, and protect your data. 
(INFORMATION CENTER) READ ABSTRACT |

Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance by IBM

March 01, 2007 - (Free Research)
This paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor... 
(WHITE PAPER) READ ABSTRACT |

Universitätsklinikum Erlangen strengthens analytics expertise and focuses on a customised healthcare analytics solution by IBM

April 11, 2013 - (Free Research)
View this white paper to learn how one company strengthened analytics by developing a focus on customised healthcare. It linked to relevant operational systems, how to optimise information flow and how to support the overall strategic control of the hospital at just the touch of a button. 
(WHITE PAPER) READ ABSTRACT |

April Business Information E-Zine - Cutting-edge App That In-Memory Technology Makes Possible by SearchBusinessAnalytics

April 23, 2013 - (Free Research)
Consult this resource to find out more about how recent advances have opened in-memory technology to more businesses. It outlines how the excess of business information creates obstacles for many enterprises. Uncover how your business can take control of your data instead of vice versa by reading this resource now. 
(EZINE) READ ABSTRACT |

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information by Iron Mountain

December 31, 2013 - (Free Research)
Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices. 
(WHITE PAPER) READ ABSTRACT |

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 11, 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

IBM PureData System for Operational Analytics by IBM

January 30, 2013 - (Free Research)
Collecting data from call centers, mobile applications, and fraud detection systems is ineffective if your business doesn't know how to correctly interpret the data. Fortunately, this white paper explores how to turn data into insight with in-database analytics. Give your company the competitive advantage it deserves by consulting this resource. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Information Management: Address Your Information Governance by OpenText

September 23, 2013 - (Free Research)
View this resource to learn the importance of a well-governed environment. Find out how to lower costs, reduced business and legal risk, and efficiency and productivity gains that will add value to your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Information Governance Survey Results from SearchCompliance.com by Iron Mountain

April 01, 2012 - (Free Research)
Download the results of our 2012 survey on the state of information governance. Find out how decision-makers from IT to records management and compliance rate the value of information governance, the business drivers behind such programs, planned areas of spending and much more. 
(EBRIEF) READ ABSTRACT |

1 - 25 of 464 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts