White Papers by Topic: Business intelligence

Resources available: 181

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context

This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

Enterprise architects challenged to manage data explosion

Read this whitepaper to find out how Red Hat Storage Server can allow enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.

CIOs strive to harness Big Data while keeping an eye on the bottom line

Read this whitepaper to learn how Red Hat Storage Server allows CIOs to confidently support business growth, manage cost and risk, capitalize on emerging technologies, and drive future innovation across their organizations.

Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security

Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are they protecting that data? This eBook addresses three myths of big data security.

Magic Quadrant for Data Masking Technology

IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Read the full report to learn about IBM.

Best Practices for Securing Hadoop

Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a structured approach to security.

Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges

Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data.

The Keys to Securing Data in a Collaborative Workplace

Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?

Trends Shaping Software Management: 2014

Most IT executives recognize the relationship between mobile computing and worker productivity, and have long issued notebook computers and other mobile devices to road warriors and employees who work extended hours.

Software Asset Management: Pay Attention or Pay Up

There is a wide range of options for managing software assets, from in-house solutions to the cloud to managed services providers. Read this whitepaper to learn The best approach to SAM, Using SAM to inform software investments, and more

©1994-2014 Infoworld, Inc.