Data Management

Big Data, Hadoop, and analytics help unearth valuable patterns in business information. But without proper management, backup, archiving, and protection, you're taking an unacceptable risk.

  • Privileged Users: Superman or Superthreat?

    White Papers // Jun 2016 // provided by Forcepoint

    Privileged Users are, without a doubt, the most dangerous cybersecurity threat as they continue to cost organizations billions in corporate losses. Additionally, the risk to your bottom line and of intellectual property theft isn’t limited to a certain industry. It happens across the board from the financial sector to energy ...

    Download Now
  • Unlocking Business Success: The Five Pillars of User Risk Mitigation

    White Papers // Jun 2016 // provided by Forcepoint

    We offer you tools that help innovate your security program, combining the latest technologies with a human-led, step-by-step strategic plan toward protecting your data. User dynamics have dramatically changed and organizations refuse to accept that the worst can happen from within their network. As a result, IT teams are ...

    Download Now
  • How CISOs Tackle Insider Threat Data Protection

    Webcasts // Jun 2016 // provided by Forcepoint

    78% of employees pose critical threats to your security, says a study from the Ponemon Institute (1). Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional ...

    Watch Now
  • Technologies to Thwart Insider Threats

    Webcasts // Jun 2016 // provided by Forcepoint

    78% of employees pose critical threats to your security, says a study from the Ponemon Institute (1). Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional ...

    Watch Now
  • Technologies to thwart insider threats

    Webcasts // Jun 2016 // provided by Forcepoint

    78% of employees pose critical threats to your security, says a study from the Ponemon Institute (1). Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional ...

    Watch Now
  • Defeating the threat from within

    White Papers // Jun 2016 // provided by Forcepoint

    All networks are vulnerable because they have people using them. These are ordinary users focusing on getting their job done, not worrying about security. It is dangerous to assume that your workforce is “too smart” to avoid breaches. Understand that 94% of your employees will potentially be duped by a ...

    Download Now
  • Cloud-Based Course Development: Teaching with a "Safety" Net

    White Papers // Jun 2016 // provided by IIMA

    In this paper, the author makes a case for teaching without a text by employing cloud-based resources. It covers problems commonly associated with the use of texts, outlines a process for developing courses without textbooks, uses their e-commerce course as an example of applying the process to a course, and ...

    Download Now
  • Data Engineering vs. Data Science - What's the Difference?

    Research // Jun 2016 // provided by TR Resource Library

    The current technology trend has been shaped by a data explosion - the phenomenon better known as 'Big Data'. Big Data has resulted in enterprises realizing the need for data science and data engineering. With the growing understanding of how these two concepts can help businesses, the need to have ...

    Download Now
  • B2B Data Exchange - Latest Trends and Practices

    Research // Jun 2016 // provided by TR Resource Library

    Business-to-business data exchange (B2B DE) is a new and interesting data management (DM) concept. Like any other DM discipline, B2B DE is changing and modernizing to keep up with evolving technologies in the IT environment. It is also transforming the way in which enterprises leverage exchange data to get new ...

    Download Now
  • 10 Analytics Trends That Will Rule 2016

    Research // Jun 2016 // provided by TR Resource Library

    As Big Data and Cloud continue to grow in volume and scope, adopters reap the benefits of an agile, secure, and dynamic infrastructure for their data resources. For data analytics, 2016 will see intelligent and secure, Cloud-enabled analytics and applications grow in popularity. Automated, dynamic tools and accuracy in spotting ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?