Techworld

White Papers: Data management


Sort by: Date | Company | Title


7 Must Haves for Mobile App Security
By Good Technology | 13/2/2014
Enterprise mobile apps represent an opportunity to enhance user productivity. IT has to secure and manage the data flowing through these apps but shouldn't compromise the user experience. Read this tip sheet to learn what’s needed in a mobile app security solution that will transform the enterprise.
Download this now


Challenges & Opportunities for Government Data Management in Australia
By CommVault | 27/11/2013
From almost every angle, the message for Australian government bodies is as clear as it is for their private sector counterparts: do more with less. Effective data management policies are often the best ‘unrealised’ opportunities to directly address these high-level challenges, especially when it comes to government data custodianship.
Download this now


Guide to the TCO of Encryption
By CheckPoint | 5/9/2013
While “free” open-source applications still carry unavoidable costs of installation, management, and usage, some costs can be controlled or even eliminated by smart use of appropriate applications, management technology, and best practices. In this whitepaper, we analuse the total cost of owning, managing and using full-disk encryption in large organisations. Click to download!
Download this now


Managing at Petabyte Scale
By NetApp | 21/5/2013
Given the proliferation of external source-generated information, it's no wonder that stored data growth within the data centre now averages 50 - 80% on a compounded annual growth rate basis. This growth is only expected to accelerate - not decrease - and many enterprises should prepare to manage storage at the petabyte scale. This resource proposes a method for today's enterprise to handle this data - storage equipped for the petabyte scale. Check it out now to discover the attributes of a storage infrastructure that can be managed at the petabyte scale and learn how you can turn these attributes into concrete features of your storage.
Download this now


Batten Down the Hatches! A Guide to Protecting Data in Motion
By Senetas | 17/5/2013
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.
Download this now


Saving Time and Money with Savvy Use of Flash in Automated Storage Tiering
By Westcon | 14/5/2013
In a sluggish economy, getting the best ROI on every IT dollar spent is the top priority for almost every business. Storage budgets in most IT environments continue to remain flat or are capped as a percentage of the overall IT spend, while data storage requirements continue to grow at an unsustainable pace. Download now to learn about the benefits of using flash in automated storage tiering.
Download this now


Meeting the Challenge of Big Data (eBook)
By Oracle | 21/3/2013
There are four key characteristics that define big data: Volume, Velocity, Variety and Value. Volume and velocity aren't necessarily new problems for IT managers; these issues are just amplified today. The distinguishing characteristics of big data that do create new problems are the variety and low density value of the data. Learn more.
Download this now


Seeing the Forest for the Trees - A Systematic Approach to Application Performance Monitoring
By REMASYS | 4/3/2013
How we build and use complex IT systems has evolved dramatically over the last 10 years however application performance monitoring (APM) remains dominated by traditional “bottom-up” approaches that emanate from infrastructure monitoring practices and a concern for technology over service delivery. We propose a fundamentally different top-down methodology that derives its approach from the principles of systems engineering. This approach focuses on service delivery, not technology, and is well suited to problem localisation in complex systems. Read on.
Download this now


Kill Your Data To Protect It From Cybercriminals
By Trend Micro | 13/2/2013
There are two types of data: the kind of data that someone wants to steal and everything else. Most security professionals today do not understand the motivations behind data theft. In this Forrester whitepaper, we explore how encrypting, and thereby devaluing, your sensitive data, you can make cybercriminals bypass your networks and look for less robustly protected targets. Find out how to use encryption, tokenization, and other technologies to “kill your data". Click to download!
Download this now


Zero Downtime Migration to Oracle Exadata Using Oracle GoldenGate
By Oracle | 26/9/2012
In this paper we will review Oracle GoldenGate’s capabilities and how it can be used to achieve zero downtime migration and consolidation to Oracle Exadata. We will provide high-level implementation steps for migration with GoldenGate and a customer case study example.
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers