data integrity

Results 51 - 75 of 90Sort Results By: Published Date | Title | Company Name

Addressing Compliance Requirements for Privacy, Data Retention, and e-Discovery

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.

Overall Approach to Data Quality ROI

Published By: SAP     Published Date: Jun 23, 2009
Learn the importance of Data Quality and the six key steps that you can take and put into process to help you realize tangible ROI on your data quality initiative.
Tags : 
roi, data quality, sap, return-on-investment, crm, erp, enterprise resource management, customer relationship management, crm, business intelligence, referential integrity, sql, data quality scoring, target marketing, enterprise applications, data management, enterprise resource planning, return on investment
    
SAP

Creating Business Value Through Location-Based Intelligence

Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement, gps, mobile data systems, mobile workers, business intelligence
    
SAP

Data Migration Management: A Methodology - Sustaining Data Integrity for Going Live and Beyond

Published By: SAP     Published Date: Mar 24, 2011
As you prepare to embark on an ERP implementation or to upgrade an existing system, you have a lot to juggle and plan. You know the horror stories of "go-lives" going bad but you aren't sure how to avoid the pitfalls. This white paper discusses at length how Utopia's formal data migration methodology reduces the risks of large systems deployments by using a tried-and-tested framework for the entire migration process, from source data analysis through post-go-live support.
Tags : 
data migration management, source data analysis, data integrity, erp implementation, enterprise resource planning, business intelligence, configuration management, database development, data integration, data protection, data quality, data replication, web service management, data warehousing
    
SAP

Best Practices and Applications of TLS/SSL

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication, encryption, data integrity, extended validation, security policies
    
VeriSign, Inc.

Get a Close look at Microsoft® Security Measures

Published By: Microsoft Corporation     Published Date: Oct 19, 2010
Get a close look at Microsoft security measures for ensuring data protection and integrity, and learn how you can rest assured about the security and reliability of Microsoft Online Services with 24x7 IT professional support and a financially backed service level agreement (SLA) for 99.9 percent uptime.
Tags : 
microsoft online services, security measure, data protection, business productivity, collaboration, it administration, collaborative commerce, productivity
    
Microsoft Corporation

Reduce Costs and Run Your Microsoft Exchange Server on Amazon Web Services Cloud.

Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud, server, technology, configuration, cloudformation, security, knowledge management, enterprise applications, business technology
    
Amazon Web Services, Inc

Close, Consolidate and Report For Dummies

Published By: IBM     Published Date: Feb 12, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, closing, consolidation, reporting, ccr, close management, financial results, disclosure management, integration, ccr solution, business analytics, data integrity, return on investment, risk management
    
IBM

Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring

Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire

Database Security: KuppingerCole Leadership Compass

Published By: IBM     Published Date: Apr 13, 2018
Database security protects databases against compromises of their integrity, confidentiality and availability.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

The Challenge of Burdensome Recovery Processes and Long Recovery Times in the Government and Legal

Published By: InMage     Published Date: Feb 24, 2009
The AODA currently provides IT support and management for 32 remote offices serving approximately 1,000 end users. In a field dependent upon the highest standards of data integrity, protection and retention, it was critical for the AODA to implement the disaster recovery (DR) and business continuity solutions necessary for fulfillment of its objectives.
Tags : 
inmage, data recovery, disaster recovery, business continuity, new mexico state aoda, dr scout, continuous data protection, cdp, disaster recover software, data management, data protection
    
InMage

Establishing Confidence in PDN Simulation

Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics

Measuring the Performance of Equalized Serial Data Links Across the Design Flow

Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics

5 Most Common Critical SQL Integrity Issues

Published By: Idera     Published Date: Sep 03, 2013
Corruption and other data integrity issues can be scary to deal with, but if you follow the advice and tips provided in this whitepaper, you will limit your exposure to corruption and always be able to take the quickest route to resolution with minimal or no data loss and minimal downtime. Just remember to stay calm and walk through the steps
Tags : 
idera, sql, sql server, data validation processes, data integrity, corruption
    
Idera

HP Backup and Recovery solutions

Published By: HP     Published Date: May 14, 2014
As a long-time leader in data protection and backup solutions, and with innovations such as HP StoreOnce deduplication, HP TapeAssure and HP StoreOpen with LTFS, HP understands your immediate requirements and strategic business direction. With an integrated approach to comprehensive business protection, we can help you safeguard the integrity of your data and rapidly restore access whenever, wherever, and however you need it.
Tags : 
hewlett packard, data protection, storeonce, tapeassure, ltfs, it management, data management
    
HP

Integrity Plus for HP StoreOnce Deduplication

Published By: HP     Published Date: Aug 08, 2014
In any storage system it is essential to ensure that the integrity of the data stored is maintained so data can be recovered exactly as it was written. HP StoreOnce appliances have been designed with the necessary technology that delivers this essential high degree of data protection. HP has unique technology that protects data throughout its lifecycle when stored on the HP StoreOnce appliance. This paper will discuss the methods used at various stages to provide this high degree of data integrity.
Tags : 
storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges, technologies, backup and recovery, data deduplication
    
HP

Viavi Special Report: Network Tools Hold Critical Insight in Attack Remediation

Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions

Driving A Single View of The Customer

Published By: Informatica     Published Date: Jan 16, 2007
The purpose of this white paper is to outline the importance of data quality with reference to single view of customer. In any organization SVC is the foundation of successful customer relationship management (CRM).
Tags : 
crm, data quality, data integrity, customer relationship
    
Informatica

The Role Of SAN Security In Storage Operations Management

Published By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : 
storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity, database security, data protection, backup, creekpath, security management
    
Creekpath

Why Migrate to HP Integrity Servers and Microsoft SQL Server?

Published By: HP     Published Date: Aug 21, 2009
Microsoft Windows-based applications and data are growing in size and complexity, reaching the limits of their architecture and scalability. Download this whitepaper to read the benefits of updating database applications to the Microsoft SQL Server 2005 platform with the HP Integrity family of 64-bit servers.
Tags : 
active directory, hp integrity, servers, windows server, sql server, it management, platforms, network management, high availability, system management software, database development, data mining, data protection
    
HP

Top 10 Data Protection Tips for SMBs

Published By: EMC     Published Date: Nov 06, 2006
The amount of data on business computers has grown astronomically over the past few decades.  If a company loses this data, business grinds to a halt. The following tips can help you select the hardware and software you need to safeguard the integrity of your data, guarantee accurate restores, and manage backups without placing an undue burden on IT personnel.
Tags : 
data protection, raid, disaster plan, smb, smbs, small business, top 10, backup and recovery, emc, emc insignia, storage, network architecture, network management, small business networks, iscsi, storage area networks, storage management, disaster recovery
    
EMC

Automated Penetration Testing: Completing the Vulnerability Management Framework

Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega, security, network security, auditing, hacker detection, internet security, intrusion detection, intrusion prevention, security management
    
Aomega

5 Simple Solutions for Developing a Collaborative Endpoint Security

Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs, endpoint security, end point security, security hardware, kace, security, internet security, security management, data quality, desktop management
    
KACE

Ensure the Integrity of your Content: ProofMark System Technical Overview

Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace

The Digital Signature Paradox

Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.