Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • White Papers // Jan 2015

    Meeting Payment Card Industry Data Security Standard 3.0 Requirements

    Merchants, large and small, face the high risk of data breaches arising from inadequate security controls that leak or allow access to sensitive cardholder data. The Payment Card Industry Data Security Standard was developed with the intent of reducing the risk of handling cardholder data by creating compliant Cardholder Data...

    Sponsored By Vormetric

  • White Papers // Jan 2015

    Vormetric Tokenization with Dynamic Data Masking - PCI DSS 3.0

    For too many IT organizations, complying with the Payment Card Industry Data Security Standard (PCI DSS) and corporate security policies has been far too costly, complex, and time consuming. Now, Vormetric offers a better way - Vormetric Tokenization with Dynamic Data Masking helps your security team address its compliance objectives...

    Sponsored By Vormetric

  • White Papers // Jan 2015

    TSIA 2014 Remote Support Trends

    Based on information gathered in TSIA’s annual Global Technology Survey, this report will look and the trend of remote support services being adopted over many different industry types. Through the continued improvement of remote control, desktop sharing and web collaboration, companies are able to use these capabilities to increase productivity...

    Sponsored By LogMeIn

  • White Papers // Jan 2015

    Harvard Business Review: The Truth about your Customer's Experience

    While Companies often focus on the individual interactions with their customers to ensure that they are satisfied with the service provided to them in that interaction, the companies can often fall short when looking at the at the complete journey of that customer on their way to purchase and beyond....

    Sponsored By LogMeIn

  • White Papers // Jan 2015

    TSIA 2014 Report: The State of Support Services

    Looking back at 2014 and the major changes in support services. TSIA identifies what they see as the ‘New World for B4B’, with companies around the world making changes to the way they are structured and how they operate. What new capabilities will be added to the arsenal of support...

    Sponsored By LogMeIn

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Forrester Report: Bring ROI to your BYOD - Japanese

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

    Sponsored By IBM

  • White Papers // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

    Sponsored By IBM

  • White Papers // Jan 2015

    RP Data Turns Mountains of Property Data into Valuable Insights

    A 70% reduction in data processing time enables RP Data to deliver faster access to valuable property information for the real estate sector. Discover how RP Data turns mountains of property data into valuable insights for customers.

    Sponsored By NetApp

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Sponsored By Symantec

  • White Papers // Jan 2015

    How To Create an Efficient IT Infrastructure

    A number of factors are driving the need to examine a business’ data centre efficiency. IT infrastructure and operational activities are directly impacting an organisation’s business processes more than ever before. Read this Tech Roundup to learn: How to optimise complex inter-relationships that drive the modern datacentre Why...

    Sponsored By Panduit

  • Webcasts // Jan 2015

    Live Webcast: Don't Drown in Your Data Lake. Improve Productivity and Decisions with a Well Governed Data Reservoir

    Many organizations are updating their data architectures to include one or more data lakes -- large pools of unstructured data that are available for multiple, unpredictable queries and uses. When you draw data from the lake, how confident are you that it’s not only relevant but also timely and clean?...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Sponsored By IBM

  • White Papers // Jan 2015

    Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report

    IBM Informix is the clear choice over Oracle Database for High Availability and Data Replication Organizations with requirements for data replication and high availability are frequently met with daunting costs, especially if they are considering Oracle database and RAC. They should be aware that there is an alternative. IBM Informix...

    Sponsored By IBM

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Sponsored By Symantec

  • White Papers // Jan 2015

    What you really want from Infrastructure Management

    This whitepaper explores the benefits of a complete and unified visualisation system that can monitor everything in IT operations environment, monitoring the performance, and availability of any aspect that support business services.

    Sponsored By CA Technologies

  • White Papers // Jan 2015

    Unified IT Monitoring: A Necessity in the Era of Customer

    This exclusive whitepaper details how unified IT monitoring can be used to deliver the customer experience your users demand. Read this report now to learn about a real life company that adopted unified IT monitoring and turned itself into an IT leader.

    Sponsored By CA Technologies

  • White Papers // Jan 2015

    Benefits of NetApp Flash for Database Workloads

    This portfolio can be used to solve complex database performance requirements at multiple levels within a customer’s Oracle environment. It also reviews Oracle database observations and results when implementing flash technologies offered within the NetApp flash portfolio. Download this report now to find out more.

    Sponsored By NetApp

  • White Papers // Jan 2015

    NetApp EF550 All-Flash Array Workload Characterization

    This technical report provides an overview of workload characterizations performed on NetApp EF-series all-flash arrays across a wide variety of I/O types - with best practices and observations based on extensive test data. Characterizations include IOPS, throughput, and latency under varying block loads and RAID levels, SSD rebuild times, EF540...

    Sponsored By NetApp

  • White Papers // Dec 2014

    The Business Data Ecosystem: Exploring the Five Elements of Digital Storage

    Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily...

    Sponsored By Seagate

  • Research // Dec 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • White Papers // Dec 2014

    Meeting the Big Data Challenge: Get Close, Get Connected

    Big Data can be a key tool in gaining a competitive advantage—allowing businesses to better understand and target their customers and transform their processes. This paper outlines the challenges related to Big Data and how to manage and overcome them, so you can derive value faster.

    Sponsored By Equinix

  • White Papers // Dec 2014

    2014 ZDNet Report - Reducing Infrastructure Cost and Complexity Through Colocation

    The growing complexity of managing datacentres is forcing organisations to take a hard look at co-location as a viable alternative to maintaining their in-house datacentre needs. Co-location will allow organisations to have the facilities they need, with provided space, power, cooling, and physical security for the server, storage, and networking...

    Sponsored By M1

  • White Papers // Dec 2014

    Secrets to better engage the mobile consumer:The role of push notifications

    Today’s consumers are on the move, and with mobile devices accounting for nearly 20 percent of site sales heading into the 2014 holiday season, creating compelling mobile experiences is no longer just a nice-to-have option. Read this research report from Aberdeen Group to get secrets on how targeted push notifications...

    Sponsored By IBM

  • White Papers // Nov 2014

    Achieving Security with Cloud Data Protection

    Today, more and more companies recognize the value and convenience of using cloud backup to protect their server data. HP Autonomy offers hosted data storage that enables you to reduce the costs, risks, and complexity of storing and protecting your business information. With a heightened focus on security, privacy, and...

    Sponsored By HP

  • White Papers // Nov 2014

    A SOLID DATA CENTER STRATEGY STARTS WITH INTERCONNECTIVITY

    Connections are great. Having a network to connect to is even better. Humans have been connecting, in one form or another, throughout history. Our cities were born from the drive to move closer to each there so that we might connect. And while the need to connect hasn’t changed, the...

    Sponsored By Equinix

  • White Papers // Nov 2014

    THE CENTER OF PERFORMANCE: ENHANCING THE APP EXPERIENCE FOR END-USERS

    In today’s technology-rich world, customers and employees demand the highest level of application performance. Failure to provide access to applications that consistently perform well anytime, anywhere, and on any device, often leads to lower productivity, customer dissatisfaction, decreased revenue and market share, and damage to brand reputation. This paper explores...

    Sponsored By Equinix

  • White Papers // Nov 2014

    PREPARATION BEGINS AT THE CENTER: HOW A STRATEGIC DATA CENTER HELPS YOU FACE FUTURE TECHNOLOGY CHALLENGES HEAD-ON

    The businesses that thrive amid fluctuating technology demands are not only keeping a finger on the pulse of current trends, they have the infrastructure in place to handle whatever changes might come. And they’re doing so by treating their data centers as a strategic asset—a hub from which providers and...

    Sponsored By Equinix

  • White Papers // Nov 2014

    THE SUCCESSFUL CLOUD-ENABLED ENTERPRISE

    It’s no secret that more and more businesses are leveraging the power of the cloud. And there’s good reason for that. Cloud computing offers the promise of cost-effective capacity on demand—anytime, anywhere, and on any device. But taking advantage of the cloud’s many benefits isn’t as simple as signing up...

    Sponsored By Equinix

  • White Papers // Nov 2014

    Overcoming Challenges in Accounts Payable Automation

    Accounts payable automation presents unique challenges. It is characterized by large volumes of data, arriving in different formats and media that must be securely received, accurately interpreted and entered into financial systems.

    Sponsored By Kofax

  • White Papers // Nov 2014

    The Top Seven Reasons to Automate Accounts Payable

    The accounts payable (AP) process is difficult to tame, yet well worth the effort. The reasons for investing in accounts payable automation are compelling, and in this paper we will make them clear.

    Sponsored By Kofax

  • White Papers // Nov 2014

    Kofax TotalAgility Accounts Payable Automation

    In a single software solution, Kofax TotalAgility Accounts Payable Automation delivers the three capabilities that AP departments agree are critical to better performance. Download now and learn about the best practice AP Workflow and effective ERP integration.

    Sponsored By Kofax

  • White Papers // Nov 2014

    Bare Metal Cloud- A Non-Virtualized Cloud Option for Performance-Sensitive Workloads

    This provides the results of a buyer/demand-side survey of U.S. enterprises with 1,000+ employees, involving more than 400 respondents, on their perceptions of the preferred business models & service providers–outsourcers from which they would want to procure private or public cloud & IaaS

    Sponsored By IBM

  • White Papers // Nov 2014

    Leveraging the Cloud for your ERP Workload

    This report explores that ERP workloads are too important and complex to risk in a commodity cloud service but too costly and labor-intense to be left out of the cloud strategy suggesting they are best served in a flexible hybrid cloud environ, designed for ERP software, managed by experts

    Sponsored By IBM

  • White Papers // Nov 2014

    Leveraging the Cloud for your DevOps Workload

    This report explores that by choosing the right PaaS, an IT organization can align development and operations resources, ensuring that applications are deployed quickly, cost-effectively, and error-free.

    Sponsored By IBM

  • White Papers // Nov 2014

    Leveraging the Cloud for your Big Data Workload

    This report explores how with the right partner, enterprises can ensure that their Big Data workloads perform consistently, securely, and cost effectively while delivering to a line-of-business colleagues’ need for on-demand, real-time analytics to make smart business decisions.

    Sponsored By IBM

  • White Papers // Nov 2014

    Migrating Your Data Center to an Application Centric Infrastructure

    Organizations everywhere recognize that changing application environments are creating new demands for the IT infrastructure, causing a transformation within the data center. There is a need to address key business and technological transitions in terms of application delivery and consumption. As such, data center managers are assessing what new capabilities...

    Sponsored By Cisco