Home
 > Research and Reports > White Papers > Data Security, Governance, and Privacy

Data Security, Governance, and Privacy

Source: Guardium
To meet regulatory requirements such as the US Sarbanes-Oxley Act (SOX), IT managers are now receiving the board-level visibility and budgets required to improve enterprise data security. For example, companies need secure and verifiable audit trails that track the activities of database administrators (DBAs) and other privileged insiders. But have you considered the seven essential elements of database security?


Featured publications:

Comparing the Total Cost of Ownership of Business Intelligence Solutions
Source: Birst For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions. Read More...
ExecBlueprints: Balancing Security and Convenience: Key Strategies for Creating a Safe and Efficient Infrastructure
Source: Skillsoft As technology choices have multiplied and IT’s importance to organizations has grown, more IT leaders are involved in understanding the needs of the business and participating in discussions concerning risk and reward. This white paper offers an overview of current issues that IT faces as it navigates this tricky terrain. Read More...
ExecBlueprints: Device-Reliant vs. Data-Reliant: How Mobile and Cloud Technologies Influence Workflow
Source: Skillsoft Cloud computing offers an extremely cost-effective alternative to traditional hardware-based infrastructures, but the advantages in flexibility and price must be weighed against issues of security, reliability, and capability. Business unit leaders must partner with IT to determine their needs, understand the impact of new technologies, and chart a path forward together to facilitate stability and efficiency across the entire organization.   Read More...


You may also be interested in these related documents:

Data Masking: Strengthening Data Privacy and Security
Source: Camouflage Software Inc. Many business activities require access to real production data, but there are just as many that don’t. Data masking secures enterprise data by eliminating sensitive information, while maintaining data realism and integrity. Many Fortune 500 companies have already integrated data masking technology into their payment card industry (PCI) data security standard (DSS) and other compliance programs—and so can you. Read More...
Privacy Challenges for Data Providers
Source: Initiate Systems, Inc. Ensuring the quality, accuracy, and security of customer data has never been more important than it is today. The growing potential for privacy breaches and tighter compliance regulations have created unique challenges and responsibilities for many data providers. Here we discuss some of the key privacy issues surrounding data management, and how partnering with a provider of master data management (MDM) software can help. Read More...
Lean IT Governance: The Most Realistic and Attainable Approach to IT Governance
Source: Innotas The most realistic and attainable approach to IT governance is a "lean" approach via project portfolio management (PPM). The lean approach requires a light footprint life cycle, rapid implementation of proven practices, and centralized data. It is based on simplicity and achievability, building on what works while establishing headroom for continuous improvement. Read More...

 
comments powered by Disqus



Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.