On Demand
As organizations incorporate newer data strategies, they also need to consider data-centric security. Data-centric security focuses security controls on the data, rather than perimeter servers or other infrastructure or the network. The goal is to protect sensitive data where it is stored and where it moves. This is becoming increasingly important as organizations start to deal with big data and newer data management platforms and hybrid architectures that include Hadoop and the cloud. Yet, TDWI research suggests that organizations still seem to focus on perimeter security and on application centric security for sensitive data. They think they are focused on protecting their data, but the reality is that many organizations don’t classify their data or know where their sensitive data lives, much less how to protect it.
Fern Halper, Ph.D.
Sponsored by
Cloudera, Liaison Technologies, Striim
Many organizations are responding to their raised awareness of the need for data governance by introducing data governance programs, hiring Chief Data Officers, and forming a data governance council. And while there are numerous guidelines and methods for the operating models for a data governance practice, recommendations regarding its day-to-day operationalization are much harder to come by. Specifically, how does an organization design an operational environment for instituting business data policies for usability and enforcing those policies consistently across the enterprise? Answering this question is necessary for achieving the data governance discipline without getting in the way of the business.
David Loshin
Sponsored by
ASG Technologies
In a highly competitive market, today’s forward-looking organizations are seeking to optimize and modernize their IT investments, specifically in enterprise business intelligence (BI). There’s a strong push to capitalize on newer features such as self-service BI, advanced analytics, and customized visualizations—all of which relinquish the centralized data governance necessary for corporate and regulatory compliance.
David Stodder
Sponsored by
Modemetric
Organizations are pursuing data lakes in a fury. Organizations in many industries are attempting to deploydata lakes for a variety of purposes, including the persistence of raw detailed source data, data landing and staging, continuous ingestion, archiving analytic data, broad exploration of data, data prep, the capture of big data, and the augmentation of data warehouse environments. These general design patterns are being applied to industry and departmental domain specific solutions, namely marketing data lakes, sales performance data lakes, healthcare data lakes, and financial fraud data lakes.
Philip Russom, Ph.D.
Sponsored by
Informatica Corporation, Cognizant Technology Solutions
Big data analytics is full of potential – but also fraught with pitfalls, obstacles, and a fog of hype surrounding the technologies. To be successful, organizations need to know where to begin with big data analytics and how to sustain progress so that they can achieve objectives. With key strategic initiatives hinging on success with big data analytics – including developing competitive innovations in customer intelligence and engagement, fraud detection, security, and product development – organizations need a roadmap for how to move ahead.
Fern Halper, Ph.D., David Stodder
Sponsored by
Hewlett Packard Enterprise
Business users, business analysts, and data scientists have diverse data needs and specialties, but they all have one thing in common: they are tired of long, complicated, and tedious data preparation. Unfortunately, data preparation is getting even more difficult as users doing analytics and data discovery reach out to larger volumes of different types of data.
David Stodder
Sponsored by
Cambridge Semantics, Datameer, Pentaho
The Internet of Things (IoT) is hot and getting hotter. Consumers use it for health monitoring and “smart” home devices, such as thermostats and appliances. On the business front, a piece of equipment—or any business asset, really—can be tagged, monitored, and analyzed. This might include a sensor-enabled pressure valve on a piece of drilling equipment, a tagged piece of construction material, food moving to market, or a chip placed in an employee badge, not to mention smart cities, smart power grids, and more.
Fern Halper, Ph.D.
Content Provided by
IBM, Teradata, Tibco Spotfire