Search

Find the latest technical white papers, webcasts, and product information to help you make intelligent IT product purchasing decisions.

Refine your search by:
Document Type:

Information Security Selection

  • Source: Technology Evaluation Centers
  • Written By:
  • Published:

Product Information Management (PIM)

  • Source: Technology Evaluation Centers
  • Written By:
  • Published:

Health Care Information Management System (HCIMS)

  • Source: Technology Evaluation Centers
  • Written By:
  • Published:

Antidot Information Factory

Information Lifecycle Management: A Perspective

A new trend is emerging in the world of storage management, and it’s called information lifecycle management (ILM). Just what it is, however, varies significantly from vendor to vendor. Generally, ILM is a strategy for policy-based information management. Its mandate: to provide centralized management of all information assets, aligning storage resources with the value of the data residing in them. Read More

Information Governance in a World of Big Data

Organizations need to evolve the governance of their information assets and respond to the opportunities and challenges brought by the mega trends such as Big Data, the cloud, etc. Information governance already exists in most large organizations and has different, often unconnected focal points. This white paper discusses the current state of information governance and new challenges, and makes recommendations for what organizations need to do to succeed in the world of Big Data. Read More

Enterprise Information Portals

Smart enterprises know that focusing purely on core competencies is not sufficient for survival in a competitive marketplace. They need to leverage existing information and knowledge assets in order to establish a winning advantage. To this end, enterprise information portals (EIP) deliver the capability to manage your implicit and explicit knowledge assets. Learn about current trends in EIP and how they affect you. Read More

Information Security in Law Firms

For advocacy firms, safeguarding client information is of paramount importance. One key concern for these law firms is the presence of vulnerabilities in their networks due to the general lack of user awareness in information security issues. While there are a number of solutions on the market to combat threats, MicroWorld’s suite of security solutions provide highly advanced protection that businesses can rely on. Read More

Secure Information Sharing

With data theft on the rise, many companies are forced to improve their network security. And although they spend millions of dollars every year on securing these networks, the focus has largely been on securing the access to the network rather than protecting the information itself. Secure information sharing (SIS) solutions integrate additional intelligence into the process—and protect your data without added overhead. Read More
Results 1 - 10 of 5932
|< <
1 2 3 4 5 6 7 8 9 10
... > >|