Data Audits Reports

Data quality emerges from Covid-19 more critical than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Data quality emerges from Covid-19 more critical than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

A Computer Weekly buyer’s guide to auditing and testing data models
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Generative AI has arrived on the scene with a multitude of ethical issues. In this 13-page buyer’s guide, Computer Weekly explores those considerations, assesses data classification tools and looks at how to improve test data management.
Posted: 18 Aug 2023 | Published: 18 Aug 2023

TechTarget ComputerWeekly.com

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

CW Buyer's Guide: Big Data Infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

TechTarget ComputerWeekly.com

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

DatAdvantage: Comprehensive Data Governance
sponsored by Varonis
PRODUCT LITERATURE: This paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...
Posted: 01 Sep 2007 | Published: 31 Aug 2007

Varonis

Big Data in Motion: Getting The Data To Where It’s Needed
sponsored by TechTarget App Architecture
EBOOK: Big data is great, but how do you get it all to the analytical engines? Read this white paper to learn how to start getting big data to where it's needed.
Posted: 25 Jan 2013 | Published: 31 Dec 2012

TechTarget App Architecture