White Papers

Channel: Information and Analytic Strategy - David Loshin RSS Feed for Information and Analytic Strategy - David Loshin


Displaying 1–15 (of 5696)

Popularity is determined by a calculation of page views and community comments.

Title Date
Who Owns Your Data? Summary
7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.

sponsored by: SailPoint Technologies
The Gorilla Guide to Linux Networking 101 Summary
In this e-book, gain valuable insights into Linux networking basics so your organization can meet the growing demands of users by connecting their applications and data as reliably, securely and efficiently as possible.

sponsored by: Cumulus
Migrating ERP and Financial Systems to the Cloud Summary
Learn about the top drivers behind cloud-based ERP adoption and discover 5 ways cloud ERP systems can bring simplicity, agility, and scalability to your IT infrastructure.

sponsored by: Oracle NetSuite
Seven Laws for Universal Data Summary
In this era of digital chaos, explore what you need to have a data management framework that can sort through the mess and provide useful information.

sponsored by: SAP
The data center network manager's guide to the future Summary
A data center network manager needs to be alert and ready for new challenges. This guide outlines what's coming and how to keep data center operations flowing.

sponsored by: SearchNetworking.com
Banking on Cybersecurity Summary
According to PWC's Global Economic Crime Survey, cybercrime has jumped to the second-most reported economic crime and financial organizations are prime targets. This white paper offers best practices to strengthen data security and regulatory compliance in financial services.

sponsored by: HyTrust
Workforce Management for Small and Midsize Contact Centers Summary
Explore how you can evaluate and evolve your workforce management practices for small and midsize contact centers, with the help of better workforce management tools.

sponsored by: NICE Systems
You Need an Action Plan for the GDPR Summary
It's time to create an action plan to tackle GDPR. This 10-page Forrester Report offers GDPR assistance to security and privacy professionals in preparing data protection strategies to comply with 5 core requirements of the regulation.

sponsored by: SailPoint Technologies
Report: IAM Leadership Compass Summary
This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.

sponsored by: Janrain
Transform Your SAP Deployment with Managed Cloud Services - Six Lessons from Users Summary
In this Frost and Sullivan research report, explore 6 major concerns many companies have about moving business-critical apps like SAP to the cloud. Then, learn why adopting a managed cloud service can help remediate these fears and get you safely to your new environment.

sponsored by: IBM
Computer Weekly – 12 December 2017: The 50 most influential people in UK IT Summary
This week's Computer Weekly reveals who made the annual list of the 50 most influential people in UK IT, and a discussion with this year's winner, Mayank Prakash, chief digital and information officer at the Department for Work and Pensions, about the challenges and opportunities of digital government.

sponsored by: ComputerWeekly.com
Executing a Lockdown on Cybersecurity Threats Summary
Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.

sponsored by: Navex Global
Compare the top enterprise file-sync-and-sharing vendors Summary
Enterprise file sync-and-sharing allows for simpler file access and sharing on the consumer and business level, but with so many vendors in the market it can be difficult to compare options. Download this e-guide to learn about the different capabilities of various vendors and what they can do for your mobile EFSS needs.

sponsored by: Insight
Stopping the Insider Threat Summary
Insider threat is an IAM issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. Explore this white paper to gain insight into insider threats and how you can prevent them with a successful IAM approach.

sponsored by: SailPoint Technologies
SQL Server for the Oracle DBA Summary
The role of the DBA is evolving faster than ever and Oracle DBAs are increasingly expected to support Microsoft SQL Server. In this white paper, learn why organizations are adopting SQL Server and how to evaluate database management solutions.

sponsored by: Quest

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>