"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

information assets

Results 1 - 25 of 46Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Apr 07, 2009
Application Portfolio Optimization (APO) provides executives with tools and information to assess the quality and condition of application assets as well as a means for understanding the impact of proposed application changes.
Tags : 
asg, cmdb, bsm, itil, bsm, portfolio optimization, apo, mining tools
    
ASG Software Solutions
Published By: Canon Business Process Services     Published Date: Aug 28, 2013
Effective records management programs mitigate records compliance risk, leverage proven technology, gain more control over its information assets, improve operational efficiency and offer the ability to continuously improve.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management
    
Canon Business Process Services
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
Resistance to change is futile. Financial services are becoming more embedded in the banking customerís everyday life, driving unprecedented levels of change across the industry. The unfolding digital economy is ushering a new era of technology adoption in banking. From cloud to open banking APIs, these play a defining role in enabling banks to create new digital products and services, refresh the bank branch, find new customer segments, and monetize underutilized data and information assets.
Tags : 
opening banking, api, data, currency, cloud transformation, frictionless banking, business model disruption
    
Juniper APAC DWA Cloud Leads July 2017
Published By: IBM     Published Date: Oct 13, 2016
Cloud-based data and processing services present too much opportunity for organizations to ignore. How can organizations realize the obvious financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy? Good hybrid information governance implies several priorities for IT and the business which are based on these foundational pillars: - Broad agreement on what information means - Clear agreement on how owned information assets will be maintained and monitored - Standard practices for securing strategic information assets - Enterprise data integration strategy
Tags : 
ibm, trusted data, big data, governance, data governance, data management, data center
    
IBM
Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners
Published By: OneLogin     Published Date: Oct 24, 2017
Weíre living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: Canon Business Process Services, Inc.     Published Date: Aug 17, 2015
This paper will explore the potential of applying business performance management (BPM) principles to advance document performance management (DPM) in a way that enables organizations to reduce costs; better manage documents as vital strategic, ?nancial and information assets; and secure positive returns on investments from outsourcing. An example of this approach ó spotlighted later in this paper ó is MAX, a document performance management system that enables companies to more effectively manage their document processes and outsourcing service providers.
Tags : 
canon business process services, document management, document imaging, business performance management, outsourcing services, managed services, balanced scorecard framework, slas
    
Canon Business Process Services, Inc.
Published By: HP     Published Date: Jul 29, 2008
Join Forrester Research and HP in this webinar which explores common myths about IT disasters and analyzes different strategies to protect a company's information assets based on risk and cost. Stephanie Balaouras of Forrester analyzes 5 common myths around IT disasters e.g. disasters and loss of a data centers are rare.
Tags : 
disaster, disaster recovery, d/r, high availability, mission critical, forrester, webcast, webinar
    
HP
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
IBM Maximo Asset Management helps healthcare providers track, monitor and manage the increasing variety of assets on which clinical outcomes and patient care depend. It provides a fully integrated software technology platform, allowing a clear view of information on all assets.
Tags : 
ibm, asset management, hospital, health care, technology, assets, application integration, analytical applications
    
IBM US Smarter Buildings
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
    
ForeScout
Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companiesí most valuable information assets, but in most cases theyíre poorly protected. Itís important to secure databases as well as or better than other systems in the enterprise. But itís not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, encryption
    
McAfee
Published By: Citrix     Published Date: Jan 20, 2009
With server virtualization now well established in the world's datacenters, IT leaders are turning their attention to virtualizing and centralizing desktop PCs to address some of their toughest computing challenges: . Managing complex end-user hardware and software infrastructure . Securing networks and information assets . Supporting a global workforce in an environment of constant change
Tags : 
citrix, virtualization, desktop virtualization, blade pc, on demand, hdx, xendesktop, sla
    
Citrix
Published By: iKnowtion     Published Date: Nov 17, 2011
This highly successful dot-com brand leveraged its customer information assets to understand the broad range of customers attracted to its product offering, as well as how to evaluate each customer's future value potential.
Tags : 
customer intelligence, crm solutions, customer analytics, value estimation, customer potential, data modeling, marketing analytics, iknowtion
    
iKnowtion
Published By: IBM Software     Published Date: Feb 16, 2011
IBM Cognos Business Insight changes information delivery for all business users. Watch this recorded event which originally aired on February 15, 2011 to see how this unlimited BI workspace enables business users to create, personalize and interact with all of their information assets. Through demos and discussion, you'll learn how this revolutionary interface lets users: . Satisfy all their information needs in a single, highly intuitive workspace . Blur the lines between business authoring and analysis . Easily create net-new analysis . Enhance existing reports with information from a personal data source Discover how IBM Cognos Business Insight enables self-service BI for business users, while giving IT complete confidence that data will remain secure.
Tags : 
ibm, cognos, business intelligence, query, analysis
    
IBM Software
Published By: Kaseya     Published Date: Mar 12, 2015
Turn management data into actionable business information that helps create operational efficiencies and demonstrate value.
Tags : 
data management, business information, audits, inventory information, it policies, automation management systems, it assets, it solutions
    
Kaseya
Published By: IBM     Published Date: Feb 08, 2008
Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.
Tags : 
bank, banks, financial, financial institutions, fisma, compliance, data security, information management
    
IBM
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance
    
Aveksa
Published By: Nuance     Published Date: Jul 11, 2011
Knowledge that exists on paper tends to stay on paper, but in today's Internet-driven, knowledge-based economy, quick access to important information is critical.
Tags : 
nuance, integrating paper, paper documents, content management, information assets, paper, analytical applications, data integration
    
Nuance
Published By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : 
software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction
    
IBM
Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
    
Qualys
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.
Previous   1 2    Next    
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory