> Technology > Data Management
 

Data Management

Data Management comprises all the disciplines related to managing data as a valuable resource. Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise.
Results 4576 - 4583 of 4583Sort Results By: Published Date | Title | Company Name

5 Simple Solutions for Developing a Collaborative Endpoint Security

White Paper Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection
    
KACE

Symantec Backup Exec 11d for Windows Servers: New Encryption Capabilities

White Paper Published By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : 
backup, backup and recovery, disaster recovery, compliance, data protection
    
Symantec

Realizing the Business Value of Converged Applications

White Paper Published By: IBM     Published Date: Nov 06, 2006
This IBM white paper posits that most enterprises have yet to realize the full value of convergence and explains why the real promise of IP networks lies in converged applications. It goes on to explain how IP convergence can build real business value for today's busy contact centers.
Tags : 
convergence, communications convergence, ip telephony, ip faxing, networking
    
IBM

On Demand IP Communications at IBM

White Paper Published By: IBM     Published Date: Nov 06, 2006
Download this paper to learn why IBM believes that the real business value of IPC voice systems is reflected in improved employee productivity, enhanced business processes, and the ability to deliver more responsive services and offerings.
Tags : 
voip, converge, productivity, convergence, communications convergence
    
IBM

Disk-to-Disk-to-Tape Backups with EMC Insignia Solution for Data Protection

White Paper Published By: EMC     Published Date: Nov 06, 2006
By utilizing the speed and reliability of the EMC CLARiiON® AX150 networked storage system and the convenience of EMC Retrospect® 7.5 for Windows backup and recovery software, SMBs can implement fast, effective, reliable data protection that is easy to set up and manage without placing undue strain on IT resources.
Tags : 
data protection, raid, disaster plan, disk-based, tape-based
    
EMC

Top 10 Microsoft Exchange Storage and Protection Tips for SMBs

White Paper Published By: EMC     Published Date: Nov 06, 2006
The following tips can help you keep Exchange running smoothly and let you bounce back quickly from hardware failures that could threaten your Exchange server.
Tags : 
exchange server, top 10, exchange threat, exchange security, network security
    
EMC

Network Faxing and the Health Insurance Portability and Accountability Act (HIPAA)

White Paper Published By: Castelle     Published Date: Nov 01, 2006
Easily implemented and integrated with electronic medical record systems, network fax servers can play a valuable role in supporting HIPAA objectives, offering a standardized, enterprise-wide faxing solution, and helping to maintain a high standard of security, efficiency and organization.
Tags : 
hipaa compliance, ip faxing, ip networks, records management, information management
    
Castelle

Achieving Configuration Compliance in a Regulatory Framework

White Paper Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance
    
Secure Computing
Start   Previous    170 171 172 173 174 175 176 177 178 179 180 181 182 183 184     Next   End


Sub-Categories: Analytical Applications, Application Integration, Business Intelligence, Configuration Management, Data Integration, Data Mining, Data Protection, Data Quality, Data Replication, Data Warehousing, Database Development, Database Security, EDI, Service Oriented Architecture, SOAP, Web Service Management

Search      

Add Research

Get your company's research in the hands of targeted business professionals.