Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • Videos // Feb 2015

    25 years of Firewall. What's Next?

    Over the past 25 years Firewalls have evolved to become one of the must-have cyber security solutions of today. But, are they ready to deal with the security threats of the next 25 years? Join James Turner, Senior Advisor and IT Security Analyst at IBRS Australia, and examine the new...

    Sponsored By Intel Security McAfee

  • White Papers // Feb 2015

    The Cost Advantages of NetApp FlexPod Datacenter with VMware

    This whitepaper focuses on the NetApp FlexPod Datacenter offering. It compares NetApp’s capabilities to both VCE and EMC at a high level as well as demonstrating value via the Total Cost of Acquisition (TCA) and Total Cost of Ownership (TCO) analyses.

    Sponsored By NetApp

  • White Papers // Feb 2015

    ESG Report: Extending the Data Center to the Cloud

    This ESG whitepaper was commissioned by NetApp discusses that 41% of ESG research respondents reported that the cloud enabled them to realise IT cost reductions with 26% seeing improvements in productivity. Learn how you can achieve these benefits by reviewing common IT scenarios detailed in private and hybrid cloud, data...

    Sponsored By NetApp

  • White Papers // Feb 2015

    The Freedom to Run Your Business Your Way

    Workday is responsible for maintaining the core application so that customer IT staff do not have to get involved. Traditionally, IT costs more than it earns, undermining company profits rather than contributing to them. If IT professionals spend more time advancing the organisation’s mission, they do more than help trim...

    Sponsored By Workday

  • White Papers // Feb 2015

    Solution Brief : IMATION + VEEAM

    Because today’s IT managers are faced with increasingly complex environments and ever-growing data volumes, they need simple and affordable solutions to solve some critical business challenges. Imation’s Nexsan storage solutions and Veeam® Backup & Replication™ software provide a joint solution that’s perfectly tailored to meet the organizational challenges of data...

    Sponsored By Nexsan by Imation

  • White Papers // Feb 2015

    Data Protection Solutions Guide

    It is an inescapable fact that massive, relentless data growth now defines the IT landscape for organizations of all sizes. According to industry analysts IDC , from the years 2013 to 2020 the digital universe will grow by a factor of 10 — from 4.4 trillion gigabytes to 44 trillion....

    Sponsored By Nexsan by Imation

  • White Papers // Feb 2015

    Datacore & Nexsan : efficient storage virtualization

    The IT infrastructure simply has to work – despite constrained budgets, data growth and constant change. No matter the size of the data center, virtualization has driven sweeping change, making deployments more simple, scalable, and agile. Learn More...

    Sponsored By Nexsan by Imation

  • Research // Feb 2015

    Definitive Guide to Advanced Threat Protection

    Despite billions spent annually on traditional perimeter and endpoint-based security defenses, advanced threat actors cause enterprises and government agencies to make headlines every day - for all the wrong reasons. This eGuide explores recent innovations in perimeter and host-based advanced threat protection technology, combined with new network forensics capabilities, are...

    Sponsored By FireEye

  • White Papers // Feb 2015

    10 Reasons to Choose Hitachi UCP

    Sit back as we reveal the 10 reason that IT professionals choose Hitachi UCP. Find out how other IT specialists and their organisations have used UCP to support and improve their VMware and vSphere environments with reliability and agility.

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    Simplifying the Management of Macs and Mobile Devices

    A single, unified solution for managing Macs and mobile devices, Centrify Identity Service, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory,...

    Sponsored By Centrify

  • White Papers // Feb 2015

    Win the Race Against Time to Stay Ahead of Cybercriminals

    IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

    Sponsored By IBM

  • White Papers // Feb 2015

    Stepping up the Battle Against Advanced Threats WP

    The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection...

    Sponsored By IBM

  • White Papers // Feb 2015

    Break out of Silos for a future-ready Identity Infrastructure

    This white paper discusses the evolution of directories from a static repository to an active contributor to identity-related interactions, examines how integration can improve directory and data access functionality, and presents IBM solutions for directory management.

    Sponsored By IBM

  • White Papers // Feb 2015

    Cloud Requires Dynamic Security

    Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.

    Sponsored By IBM

  • White Papers // Feb 2015

    Protecting Your Critical Data with Integrated Security Intelligence

    By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.

    Sponsored By IBM

  • White Papers // Feb 2015

    Infographic - Roadmap to Content Mobility: 5 Steps to Keeping your Data Safe

    Data security is getting more complicated. Compliance is touching more and more data and too much data is stored solely on user devices. You need data in the right place at the right time, with the visibility and control to ensure that it’s handled appropriately. Your path to secure...

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    Don't Let Your DDoS Defense Fall Behind

    Distributed Denial of Service (DDoS) attacks have evolved in both intensity and intent. At first, they were used to temporarily interrupt online businesses in order to gain attention to a group or cause. Now, DDoS attacks are up to 100 times larger and are often used as smokescreens to distract...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Information Governance Best Practices: Adopt a Use Case Approach

    When should you implement integration governance? According to this Gartner research note, you should start now if you are an IT professional considering an initiative like master data management (MDM), e-discovery, information archiving or cloud migration should start implementing information governance now.

    Sponsored By IBM

  • White Papers // Feb 2015

    Top 5 Risks of Delaying Migration to Cloud

    The time is now - to adopt Cloud A recent IDC study showed that cloud solutions offer an average payback period of 7.1 months and 5-year average ROI of 626%, a level that few other investments can equal. Precipitous drops in the cost of cloud computing are making it difficult...

    Sponsored By Infor

  • White Papers // Feb 2015

    Infor CloudSuite - Flexible and Proven Solutions for your Industry

    Infor CloudSuite offers a comprehensive portfolio of solutions designed to help support manufacturing, healthcare, the public sector, and more. Infor CloudSuite lets you put some of the most innovative business technologies available today to work for your business in ways that can help optimize value and minimize risk. Download this...

    Sponsored By Infor

  • White Papers // Feb 2015

    Top 5 Ways Cloud Solutions Power Business Agility

    The real power of cloud is its ability to allow businesses to “spend less time and money managing IT, and more time focused on their real priority - growth”. This has made the industry to embrace the chance and evolve the way they manage IT. This report talks about how...

    Sponsored By Infor

  • White Papers // Feb 2015

    Top 5 Reasons Why Cloud Security Beats Traditional Security

    Not long ago, security was viewed as one of the biggest obstacles to widespread adoption of cloud-based deployments for enterprise software solutions. With recent developments and cloud vendors living exclusively in the cloud world, they have managed to build a much higher level of data center and virtual system security...

    Sponsored By Infor

  • White Papers // Feb 2015

    How to Fix Hot Spots in the Data Centre

    IT technicians will be all too familiar with the frustration of hot spots in their data centres. Many attempts to solve the problem will be short term or even cause it to spread into other areas of your data centre. Learn about some of the most common causes of...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2015

    10 Cooling Solutions to Support High-Density Server Deployment

    High-density servers present an organisation with a massive performance benefit, but does this benefit out-weigh the challenge and cost of the cooling systems needed to support them? Discover the top ten solutions used by organisations to ensure their cooling efficiency and capacity is optimised for the density and workload...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2015

    Data Centre Project: System Planning

    Planning an infrastructure project can often put a strain on your time, budget and patience. This report discusses the reasons it does not need to drive you and your team mad. If you can prioritise and solve the right problems in the right order, you can build yourself a practical...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Sponsored By Symantec

  • White Papers // Feb 2015

    Cutting Costs with Data Centre Infrastructure Management Software

    Companies around the world have felt the sting of unproductive data centres driving their costs up and creating a whirlwind of operational headaches. Learn how IT professionals are using DCIM software to: • Simplify operational processes • Lower costs • Speed up information delivery

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2015

    Meeting Payment Card Industry Data Security Standard 3.0 Requirements

    Merchants, large and small, face the high risk of data breaches arising from inadequate security controls that leak or allow access to sensitive cardholder data. The Payment Card Industry Data Security Standard was developed with the intent of reducing the risk of handling cardholder data by creating compliant Cardholder Data...

    Sponsored By Vormetric

  • White Papers // Jan 2015

    Vormetric Tokenization with Dynamic Data Masking - PCI DSS 3.0

    For too many IT organizations, complying with the Payment Card Industry Data Security Standard (PCI DSS) and corporate security policies has been far too costly, complex, and time consuming. Now, Vormetric offers a better way - Vormetric Tokenization with Dynamic Data Masking helps your security team address its compliance objectives...

    Sponsored By Vormetric

  • White Papers // Jan 2015

    TSIA 2014 Report: The State of Support Services

    Looking back at 2014 and the major changes in support services, TSIA identifies what they see as the ‘New World for B4B’, with companies around the world making changes to the way they are structured and how they operate. Take a look at the new capabilities that will be added...

    Sponsored By LogMeIn Australia

  • White Papers // Jan 2015

    TSIA 2014 Remote Support Trends

    Based on information gathered in TSIA’s annual Global Technology Survey, this report will look at the trend of remote support services being adopted over many different industry types. Through the continued improvement of remote control, desktop sharing and web collaboration, companies are able to use these capabilities to increase productivity...

    Sponsored By LogMeIn Australia

  • White Papers // Jan 2015

    Harvard Business Review: The Truth about your Customer's Experience

    While companies often focus on the individual interactions with their customers to ensure that they are satisfied with the service provided to them in that interaction, the companies can often fall short when looking at the complete journey of that customer on their way to purchase and beyond. The Harvard...

    Sponsored By LogMeIn Australia

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Forrester Report: Bring ROI to your BYOD - Japanese

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

    Sponsored By IBM

  • White Papers // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

    Sponsored By IBM

  • White Papers // Jan 2015

    RP Data Turns Mountains of Property Data into Valuable Insights

    A 70% reduction in data processing time enables RP Data to deliver faster access to valuable property information for the real estate sector. Discover how RP Data turns mountains of property data into valuable insights for customers.

    Sponsored By NetApp

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Sponsored By Symantec

  • Case Studies // Jan 2015

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Sponsored By IBM