REGISTER

Data Management

Aug9TN

Recorded:    August 9 | 2016       Attend

The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side, the surge of new devices has increased the potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

Live Webcast!

Recorded:    September 15 | 2015       Play

Inadequate security and dedicated cyber attackers have led enterprise data breaches to increase at an alarming pace. Staggering numbers of affected customers - and financial losses - are sending shock waves through the business world, and creating a sense of urgency around identifying solutions. Finding a way to ward off cyber intruders has become a critical challenge.

Big Data World

Recorded:    August 14 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

the_coming_wave

When: Aug 05 2010

Presenting: Scott Crawford - CISSP - CISM, Managing Research Director of Security

Third-party hosted security services have taken off in recent years, as has the technology of Data Loss Prevention. Soon, these two trends can be expected to converge, as DLP as a hosted service becomes more prevalent, complementing the established domains of hosted security for inbound messages and safe Web browsing.

Live Webinar

Recorded:   January 21 | 2015      Play

In 2015 the size of the digital universe will be tenfold what it was in 2010. Large-scale data breaches are on the rise across all sectors, and enterprise data security initiatives must evolve to address new and growing threats. Consumer transactions, personally identifiable information, customer records, and the like, all flowing together into the Hadoop 'data lake', will enable critical business insights but also means Hadoop installations will be a rich target for cyber-crime.

OpenText

Recorded:     March 18 | 2013    View

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. According to IDC, the amount of information created, captured or replicated has exceeded available storage for the first time since 2007, and many organization's are spending far more time looking for information than actually using it. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

Panel

When: Aug 05 2010

Presenting: Moderated by Ron Condon, TechTarget; Guy Bunker, Jericho Forum

Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.

Live Webcast!

Recorded:   October 1 | 2014       Play

If you're embarking on Hadoop adoption you know that sensitive customer and corporate data will be in the ecosystem – transactional data, intellectual property, customer files, and more. As Adrian Lane of Securosis has noted, "High quality data produces better analysis results—which is why a key ingredient is sensitive data." Now the question becomes how to keep sensitive data secure as it moves into and beyond Hadoop, and—most importantly—how to protect the data but still make it accessible by many different users with varying analytic needs and ad-hoc processes.

Mercantil Commercebank

When: Aug 05 2010

Presenting: Mauricio Angee; Mercantil Commercebank, N.A, VP, Information Security

Data Loss Prevention is not a fixed practice, it is very dynamic in nature and it is continuously evolving. Protecting critical information assets has become the main purpose of Information Security.

Quocirca

When: Aug 05 2010

Presenting: Clive Longbottom, Business Processes Facililitation, Quocirca

The paraphrasing of Oscar Wilde may seem apposite, but in actuality, the loss of even one set of data will look more like carelessness - and will have legal and brand ramifications.

Live Webcast!

Recorded:   April 23 | 2014     Attend

Let's face it, there's unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is 'How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?' With the advanced threats that are pervasive today, it's becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

SonicWALL

When: Aug 05 2010

Presenting: Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL

The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it.

Quocirca

When: Aug 05 2010 4:00 am

Presenting: Clive Longbottom, Business Process Analysis, Quocirca

Moving towards a Compliance Orientated Architecture.

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Go to top