Information FindWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Find returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Materials Compliance Management Solutions
 •   Network Security

Related Searches
 •   Coding Information Find
 •   Information Case
 •   Information Find Case Study
 •   Information Find File
 •   Information Find Intrastructures
 •   Information Find Massachusetts
 •   Information Find Own
 •   Information Tutorials
 •   Linux Based Information Find
 •   Tracking Information
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

To Pump up Data Volume, Connect Customer Channels by SearchCRM

December 10, 2013 - (Free Research)
In this chapter of our e-book series Improving the Customer Experience Through Technology, CRM professionals explain what it takes to maintain a single view of a customer's history and contact information, how multichannel organizations keep all that data in order -- and how they keep it from falling into the wrong hands. 
(EGUIDE) READ ABSTRACT |

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 24, 2009 - (Free Research)
What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements. 
(PODCAST) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 30, 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

IT Cost Savings with Information Governance - Gartner Research by IBM

April 17, 2012 - (Free Research)
In this Gartner analysis, find out how Cisco transitioned from an underperforming records management system to an information governance strategy. Discover the benefits they experienced from this switch, and best practices to help you make your own move to information governance. 
(WHITE PAPER) READ ABSTRACT |

Improve Organizational Communications by Cisco Systems, Inc.

October 28, 2011 - (Free Research)
As an organization’s workforce becomes increasingly mobile and dispersed, its ability to survive and thrive depends on effective employee communications. Learn about a collaboration platform that allows for improved employee communication and productivity. 
(WHITE PAPER)

Datalink's White Paper Library by Datalink and NetApp

May 06, 2010 - (Free Research)
Welcome to Datalink’s White Paper library. Inside you will find valuable data expertise - from an objective perspective. Here, you can find the information about the latest storage trends, relevant data topics, and new strategies to store, manage, and protect your data. 
(INFORMATION CENTER) READ ABSTRACT |

The Executive Guide to Data Loss Prevention by Websense, Inc.

August 18, 2009 - (Free Research)
Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs. 
(WHITE PAPER) READ ABSTRACT |

Information Optimization Transformation Experience Workshop by Hewlett-Packard Company

April 12, 2013 - (Free Research)
Many organizations continue to struggle with basic BI competencies, such as information quality, data integration, governance, and accessibility. Read on to learn how you can benefit from an online Big Data workshop where your business and IT leaders can collaborate on the latest strategies and trends about strategic information management. 
(WHITE PAPER) READ ABSTRACT |

Connecting Through Content, Issue Two by KnowledgeStorm, Inc (E-mail this company)

May 21, 2007 - (Free Research)
Connecting Through Content, Issue Two examines how technology buyers search for content and how marketers deliver content to them. Content distribution channels, user search techniques, content registration behavior and other aspects of content distribution and syndication are evaluated. 
(ANALYST REPORT) READ ABSTRACT |

Business Outcomes from Big Data by ComputerWeekly.com

April 10, 2013 - (Free Research)
This research study from CEB evaluates the CIO's role in making big data attainable and useful for the business. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 26, 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Kognitio delivers for ScottishPower by Kognitio

June 10, 2013 - (Free Research)
Find out how a company working toward dominance as a multi-utility supplier can achieve effective customer relationship management (CRM.) This resource explores how one company found a way to scan millions of rows of information in seconds to utilize and interpret valuable information. 
(WHITE PAPER) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

July 24, 2012 - (Free Research)
This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Improve Organizational Communications to Drive Business Results by Cisco Systems, Inc.

October 21, 2011 - (Free Research)
As an organization’s workforce becomes increasingly mobile and dispersed, its ability to survive and thrive depends on effective employee communications. Access this resource to learn about collaborative tools that enable increased productivity, business agility and competitive advantage. 
(WHITE PAPER)

Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance by IBM

March 01, 2007 - (Free Research)
This paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor... 
(WHITE PAPER) READ ABSTRACT |

Universitätsklinikum Erlangen strengthens analytics expertise and focuses on a customised healthcare analytics solution by IBM

April 11, 2013 - (Free Research)
View this white paper to learn how one company strengthened analytics by developing a focus on customised healthcare. It linked to relevant operational systems, how to optimise information flow and how to support the overall strategic control of the hospital at just the touch of a button. 
(WHITE PAPER) READ ABSTRACT |

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. by dataguise, Inc.

June 01, 2010 - (Free Research)
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Information Optimization Transformation Experience Workshop by Hewlett-Packard Limited

January 24, 2013 - (Free Research)
Many organizations continue to struggle with basic BI competencies, such as information quality, data integration, governance, and accessibility. Read on to learn how you can benefit from an online Big Data workshop where your business and IT leaders can collaborate on the latest strategies and trends about strategic information management. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by LogRhythm, Inc.

May 07, 2013 - (Free Research)
This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs. 
(ANALYST REPORT) READ ABSTRACT |

EHR Decisions Checklist: Finding the Right EHR Vendor for Your Facility by Iron Mountain

March 30, 2012 - (Free Research)
This health care IT decision checklist provides facilities with a buyer's guide as well as valuable tips and recommendations for finding the right EHR vendor. 
(EBOOK) READ ABSTRACT |

Information Governance Survey Results from SearchCompliance.com by Iron Mountain

April 01, 2012 - (Free Research)
Download the results of our 2012 survey on the state of information governance. Find out how decision-makers from IT to records management and compliance rate the value of information governance, the business drivers behind such programs, planned areas of spending and much more. 
(EBRIEF) READ ABSTRACT |

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information by Iron Mountain

December 31, 2013 - (Free Research)
Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices. 
(WHITE PAPER) READ ABSTRACT |

5 Ways to Ensure Information Management Compliance by Iron Mountain

March 13, 2012 - (Free Research)
Use this resource as a guide to to make sure your information is maintaining compliance with regulations and standards. Find five tips to help lower your risk profile and boost your audit readiness. 
(DATA SHEET) READ ABSTRACT |

The Information-Driven Enterprise: How Businesses are Fueling Success by Hewlett-Packard Limited

November 30, 2012 - (Free Research)
In this report from Forrester Consulting, find the results of a survey of over 150 business technology executives regarding their journeys to smarter information management. Also inside, learn about the key role that analytics tools are playing in driving business success. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts