Information Management

Information Management is the handling of information acquired by one or many disparate sources in a way that optimizes access by all who have a share in that information or a right to that information.
Results 201 - 225 of 429Sort Results By: Published Date | Title | Company Name
By: Trillium Software     Published Date: May 25, 2011
To achieve business goals and objectives, you must first optimize the information supporting all of your business processes. Implementing an Information Quality Management practice and applying best practices will help maximize the value of your information.
Tags : trillium software, information quality management, iqm, business process silos, tactical data, strategic information, productivity, mdm, michele goetz, information maturity, data quality, information management
     Trillium Software
By: Trillium Software     Published Date: May 25, 2011
Why is it important to align the groups responsible for your critical business processes and your data management efforts? Learn how to create a partnership between business and IT to deliver higher value to your business.
Tags : trillium software, data management, business process, rob karel, forrester, information quality management, business value, business process automation, business process management, data quality, information management
     Trillium Software
By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing, cms, content management system, project management, content delivery, content integration, document management, information management, records management
     Quark, Inc.
By: Riverbed     Published Date: Apr 27, 2011
This paper examines the trends towards server consolidation and virtualization, and how WAN optimization can help IT organizations address the challenges of application performance and information availability within these environments.
Tags : riverbed, virtualization, server consolidation, wan optimization, application performance, information availability, disaster recovery, infrastructure consolidation, storage virtualization, application performance management, server virtualization, information management
     Riverbed
By: Nuance     Published Date: Apr 21, 2011
This white paper describes a list of pdf misconceptions versus the truth.
Tags : nuance, pdf, collaboration, hardware, software, business intelligence, content delivery, content integration, content management system, document management, information management, records management, secure content management
     Nuance
By: SAP     Published Date: Feb 11, 2011
Read this Aberdeen Group research report, "Access Management: Efficiency, Confidence and Control" and learn how top performers protect access to information assets at lower cost while staying on top of compliance.
Tags : sap, access management, efficiency, confidence, control, auditors, access control, information management
     SAP
By: Epicor     Published Date: Feb 02, 2011
This paper discusses some important considerations for A&D manufacturers in the context of enterprise information systems and how they can help in addressing five important areas of concern-compliance, control, communications, competitiveness, and cutting cost, waste and complexity.
Tags : epicor, a&d manufacturer, enterprise information system, aerospace and defense, product lifecycle management, engineering, compliance, enterprise resource planning, enterprise software, information management, manufacturing execution systems
     Epicor
By: NetIQ     Published Date: Dec 23, 2010
This white paper provides the steps to successfully implement the critical security controls listed in the CAG in order to avoid "adding another checklist" to an already overburdened and underfunded organization that is struggling to meet growing security and compliance demands. It also describes how NetIQ can help federal agencies implement and automate these controls.
Tags : netiq, consensus audit guideline, cag, security control, federal agencies, cyber security, information security management, auditing, internet security, information management
     NetIQ
By: ParAccel     Published Date: Dec 16, 2010
This solution brief explains how Fidelity Information Services (FIS) executives realized that they needed an analytics database solution that could keep up with additional fraud complexity as well as much larger sets of data to improve detection rates.
Tags : paraccel, analytic database, financial fraud analytics, fidelity information services, business analytics, analytical applications, database development, database security, information management
     ParAccel
By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption, encryption, internet security, security management, database security, information management
     Centrify Corporation
By: IBM     Published Date: Dec 06, 2010
Although great strides have been made to automate most services, government agencies remain burdened with processes that require high levels of manual intervention that, in turn, can lead to operational inefficiencies.
Tags : ibm filenet, government regulation, it management, productivity, case management, business application, business management, business process management, corporate governance, project management, corporate portals, document management, information management
     IBM
By: M86 Security     Published Date: Dec 01, 2010
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement, anti spam, anti spyware, anti virus, web service security, collaborative commerce, information management
     M86 Security
By: ParAccel     Published Date: Nov 15, 2010
This solution brief explains how Fidelity Information Services (FIS) executives realized that they needed an analytics database solution that could keep up with additional fraud complexity as well as much larger sets of data to improve detection rates.
Tags : paraccel, analytic database, financial fraud analytics, fidelity information services, business analytics, analytical applications, database development, database security, information management
     ParAccel
By: Mimecast     Published Date: Oct 25, 2010
Download this datasheet to learn more about a cost-effective software-as-a-service solution that seamlessly integrates with your existing email system.
Tags : mimecast, data leaks, mimecast unified email management, uem, software-as-a-service, information security, email security, data quality, information management, email archiving
     Mimecast
By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management, data protection, email security, risk management, data integration, database security, information management
     Mimecast
By: Tripwire     Published Date: Oct 14, 2010
Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.
Tags : tripwire, compliance, data protection, cio, automation, intelligence, information security, internet security, business intelligence, business process automation, information management
     Tripwire
By: Safenet     Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management, ethernet networking, wide area networks, encryption, network security appliance, risk management, total cost of ownership, information management
     Safenet
By: SafeNet     Published Date: Oct 06, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management, ethernet networking, wide area networks, encryption, network security appliance, risk management, total cost of ownership, information management
     SafeNet
By: PitneyBowes     Published Date: Sep 29, 2010
New study sheds light on how colleges and universities can better connect with alumni.
Tags : pitney bowes, information management, mail creation, mailing, contact management, content delivery, document management, data warehousing
     PitneyBowes
By: PitneyBowes     Published Date: Sep 29, 2010
Production print and mail organizations now have more ways to cut costs, drive revenue and connect with customers.
Tags : pitney bowes, digital color print, production print, mail, government, non profit, business intelligence, business management, content delivery, information management
     PitneyBowes
By: Adobe     Published Date: Sep 28, 2010
This How-To Guide for Creating Open Government reviews the opportunity of open government, how technology enables open government, and how to make government more transparent, participatory and collaborative.
Tags : adobe, open government, customer interaction, information management, collaborative, transparency, business analytics, business intelligence, business management, business process automation, business process management, customer interaction service, customer relationship management, customer service
     Adobe
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.