By using tdwi.org website you agree to our use of cookies as described in our cookie policy. Learn More

RESEARCH & RESOURCES

Checklist thumb Data Centic Security

TDWI Checklist Report | Data-Centric Security: Seven Best Practices for Protecting Your Most Sensitive Data: Checklist Data Centric Security

This checklist defines data security and data-centric security and discusses best practices and enabling technologies to help make data more secure.

File Type: .pdf File Size: 230 KB Duration: 8 pages


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

pulse report cover image

TDWI Pulse Report | The Role of Modern Data Governance in an Internal Data Marketplace: Asset

In this TDWI Pulse Report, we examine recent research regarding the use of modern cloud platforms and automation to ensure robust protection of all data assets.


Pulse Report cover image

TDWI Pulse Report | Modernizing Your Data Architecture to Unlock Business Value: Asset

In this TDWI Pulse Report, we look closely at key opportunities and challenges regarding data architecture modernization and examine how to unlock the business value of data.


Pulse Report cover image

TDWI Pulse Report | Modernizing Your Data Architecture to Unlock Business Value: Asset

In this TDWI Pulse Report, we look closely at key opportunities and challenges regarding data architecture modernization and examine how to unlock the business value of data.