IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance Multimedia (View All Report Types)
1 - 25 of 91 Matches Previous Page  |  Next Page
The Modern Approach to Enterprise Analytics
sponsored by Tableau Software
WEBCAST: The modern approach to analytics is self-service BI. It allows IT to become more strategic, enhances data visualization, and leads to better collaboration. Learn about the growing importance of fostering a culture of self-service analytics. Plus, discover how to bring better speed, value, and accuracy to your data analysis.
Posted: 08 Jul 2016 | Premiered: Jul 8, 2016

Tableau Software

9 steps to build a better insider threat program
sponsored by Forcepoint
WEBCAST: While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.
Posted: 06 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

Move Data at Maximum Possible Speed
sponsored by IBM
VIDEO: Relying on TCP-based transport technologies to transfer data over today's WANs is insufficient due to its severe performance bottlenecks. Discover how you can overcome these bottlenecks and transport large files and data sets at maximum speeds over long distances by fully utilizing available bandwidth.
Posted: 01 Jul 2016 | Premiered: 01 Jul 2016

IBM

Data Security for the Digital Businesses
sponsored by HPE and Intel®
VIDEO: How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and Intel®

How CISOs Tackle Insider Threat Data Protection
sponsored by Forcepoint
WEBCAST: Threats from within are a high priority for CISOs; even your best employees can put your data at risk. What technologies can help protect you and your employees? Hear how a real-world CISO plans, implements, and manages an insider threat program.
Posted: 30 Jun 2016 | Premiered: May 1, 2016

Forcepoint

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
PODCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

Success Story Video: State of California
sponsored by Axway
VIDEO: Find out how the State of California was able to about a managed file transfer (MFT) system to centrally manage and monitor secure file transfers across all their web sites and applications for all their agencies.
Posted: 17 Jun 2016 | Premiered: 01 May 2016

Axway

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Case study - Cherokee Investment Co.
sponsored by Citrix
VIDEO: When a massive amount of information is being shared on a daily basis, it is critical that your file sync and share system is up to par. Watch this video now to learn how one investment company enabled secure file sharing and mobility to meet the collaboration needs of users.
Posted: 13 May 2016 | Premiered: 23 Feb 2015

Citrix

Case Study: County of San Mateo Meets Data Regulation Needs with Data Management Software
sponsored by Commvault
VIDEO: Watch this brief webcast now to learn about the County of San Mateo's implementation of a data management software that balanced their different legal and regulatory requirements for data protection. See how this solution can provide your enterprise with the flexibility needed to meet changing customer requirements and government regulations.
Posted: 09 May 2016 | Premiered: 16 Oct 2015

Commvault

Top 10 ShareFile Enterprise Features IT Teams Can’t Live Without
sponsored by Citrix
WEBCAST: When deciding on an enterprise file sharing solution, it is important to consider what features your organization will utilize most. This video reveals the top 10 most frequently used features of one such solution and explains the importance of each one.
Posted: 06 May 2016 | Premiered: May 20, 2015

Citrix

Data loss prevention and enterprise file sync and sharing: is your data safe?
sponsored by Citrix
WEBCAST: Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.
Posted: 06 May 2016 | Premiered: May 13, 2015

Citrix

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

Case Study: Public Consulting Group Meets Governance, DR, and SLA Requirements with Efficient Data Management
sponsored by Commvault
VIDEO: In this case study, witness how a consulting group utilized a data management solution to seamlessly meet compliance, governance, and disaster recovery requirements for their customers. Watch now to learn more.
Posted: 04 May 2016 | Premiered: 21 Oct 2015

Commvault

How to keep Test Data current across your SAP landscape
sponsored by Attunity
WEBCAST: To ensure your testing is accurate and effective across the SAP environment, your business needs to be using the most current data. Discover how you can drastically reduce the time and effort it takes to acquire data by accessing this webinar now.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016

Attunity

HDAP: the Big Data LDAP Directory Storage
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.
Posted: 28 Mar 2016 | Premiered: Mar 15, 2016

Radiant Logic, Inc.

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security

Big Data Integration Made Easy
sponsored by IBM
VIDEO: Discover how your business can flexibly meet your unique information integration requirements – from data integration to data quality and data governance – to deliver trusted information to your mission critical business initiatives.
Posted: 16 Mar 2016 | Premiered: 30 Sep 2015

IBM

Podcast: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
PODCAST: Using these tools and tactics, you can identify advanced attacks and protect the crown jewels on your network.
Posted: 18 Feb 2016 | Premiered: Feb 16, 2016

Lancope

Smart Data Integration
sponsored by Cambridge Semantics
VIDEO: Many organizations want to dramatically increase the speed of their data integration process but lack the tools to do so. In this short video you will learn about a business analytics solution that uses an intelligent Excel-based interface to create reusable mappings between source/target systems and a conceptual model.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Cambridge Semantics

Stay in Compliance: Clinical Standards Data Management
sponsored by Cambridge Semantics
VIDEO: In this short video explore the capabilities clinical data standards management systems, and discover how your organization can stay in compliance come December 2016.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Cambridge Semantics

Reduce Your Data Integration Time & Cost up to 10x
sponsored by Cambridge Semantics
WEBCAST: This webcast uncovers a smart data integration model that uses existing ETL tools to increase the speed and decrease the cost of completing high-quality, governed data integration projects. Watch this session now to see a demo of how one solution can address common data integration challenges.
Posted: 01 Feb 2016 | Premiered: Dec 31, 2015

Cambridge Semantics

How to Build a Smart Data Lake Using Semantics
sponsored by Cambridge Semantics
WEBCAST: This webcast discusses how to build an efficient data lake with a semantic model that enables harmonization of data and analyzes your data. Access now to watch a smart data lake software demo and learn how your enterprise can benefit from implementing these tools.
Posted: 29 Jan 2016 | Premiered: Jan 29, 2016

Cambridge Semantics

Game Changing, Graph-Based Data Discovery, Analytics and Governance for the Enterprise
sponsored by Cambridge Semantics
WEBCAST: This webinar overviews a smart data lake software that allows the creation of smart data sets consisting of integrate data from different sources and locations. Access now for a demo of this software and see the benefits that it can provide to your enterprise, including shorter time-to-value, self-service data discovery and analytics, and more.
Posted: 29 Jan 2016 | Premiered: Dec 31, 2015

Cambridge Semantics
1 - 25 of 91 Matches Previous Page    1 2 3 4    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement