IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance White Papers (View All Report Types)
26 - 50 of 419 Matches Previous Page  |  Next Page
A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

Top 5 requirements for secure enterprise file sync and sharing
sponsored by Citrix
WHITE PAPER: The mobile data access challenge poses both risk and opportunities for IT. This resource highlights an enterprise ready file sync and sharing solution that provides the user experience employees want and the advanced security features required by IT.
Posted: 10 May 2016 | Published: 29 Apr 2016

Citrix

Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add
sponsored by VMware
WHITE PAPER: Data center attacks are on the rise. Physical security and firewalls aren't enough. Micro-segmentation is one of the breakthrough security benefits of network virtualization. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

ShareFile Enterprise Security White Paper
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Secure file sharing in the enterprise
sponsored by Citrix
WHITE PAPER: As companies grow globally and more dispersed, file sharing becomes more critical. If an organization does not provide a solution, employees will find one -- or more -- for themselves. Access this white paper to learn about ensuring secure data sharing and a file sharing solution that solves several sharing problems.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Get Ahead of Your Next Security Breach
sponsored by Dell Software
WHITE PAPER: An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

CISO Strategies to Fight Cybercrime
sponsored by IBM
WHITE PAPER: This report outlines how CISOs are stepping up cybersecurity efforts to focus on addressing one of the most prevalent underlying issues globally – a programmatic focus on compliance instead of risk-based outcomes. Access now to learn what strategies security leaders are using to transform their organizations.
Posted: 05 May 2016 | Published: 01 Oct 2015

IBM

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Information Sharing Defeats Data Security Threats
sponsored by Anomali
WHITE PAPER: This white paper teaches you about information sharing to quell security problems. Learn how to share information with trusted peers adhere to standards and integrate ith popular security software. Access now to enable information sharing that best suits your business' needs.
Posted: 04 May 2016 | Published: 01 Apr 2016

Anomali

It’s Time to Get Real With SDN and NFV
sponsored by Accelerated Concepts
WHITE PAPER: This white paper shows you a universal network appliance that uses NFV technology and comes at a price point that sets a breakthrough standard for the entire industry. Access now to learn about a simple, inexpensive and open path to SDN to develop new services, improve network performance and drive new business opportunities.
Posted: 04 May 2016 | Published: 01 Apr 2016

Accelerated Concepts

Governed Data Discovery: BI Tools that Balance Flexibility and Standards
sponsored by Looker
WHITE PAPER: In this report, BI consultant Wayne Eckerson explains how organizations can devise organizational, architectural, and technical frameworks to harmonize top-down and bottom-up BI approaches. Discover how several leading governed data discovery tools can balance freedom and control.
Posted: 02 May 2016 | Published: 29 Feb 2016

Looker

5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Build a Reliable, Accurate CMDB by Addressing Data Quality
sponsored by BDNA
WHITE PAPER: Discover the top data quality issues derailing your configuration management database (CMDB) initiatives. Learn how you can build and maintain an accurate, reliable CMDB by taking the steps to address poor data quality.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

How to Succeed in the New Age of Data Quality
sponsored by Trillium Software
WHITE PAPER: Businesses need accurate, easy-to-access customer data to make important business decisions. But enterprise data is not always reliable. Discover how a data quality program can ensure accuracy for more effective business decisions.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Trillium Software

Keys-to-Data-Success
sponsored by Trillium Software
WHITE PAPER: Launching a data governance program can be challenging, even if you've already sought out resources for help. This white paper features tips and tricks to further your knowledge about undertaking a new, successful data governance plan or rebuilding your current setup with a stronger foundation.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Trillium Software

Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

IBM Security Guardium Vulnerability Assessment
sponsored by IBM
WHITE PAPER: Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM

Importance of DQ in the Age of Digital Transformation
sponsored by Trillium Software
WHITE PAPER: Data is at the heart of digital transformation, and as an essential element in the majority of business initiatives, organizations need to ensure that their data is accurate. Download this white paper now to discover how data quality tools can ensure a successful digital transformation for your business.
Posted: 26 Apr 2016 | Published: 26 Apr 2016

Trillium Software

Data Quality Challenges Hindering Your CRM Initiatives
sponsored by Trillium Software
WHITE PAPER: This white paper explores the top data challenges of CRM. Discover ideas on how you can address poor data quality to help ensure the success of your CRM initiatives.
Posted: 26 Apr 2016 | Published: 31 Dec 2015

Trillium Software

Compliance Beyond Email: Navigating the Complexities within Healthcare
sponsored by Actiance
WHITE PAPER: This white paper explores how you can provide doctors and patients diverse communications coupled with strong compliance and data protection. Uncover 5 ways to mitigate legal and security risks in your healthcare organization.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

Best Practices for Enterprise IT Data Quality
sponsored by BDNA
WHITE PAPER: This white paper explores how you can successfully accelerate data maturity by leveraging 3 core capabilities: reference language, data abstraction, and content refresh processes. Plus, learn a 3-phased approach to addressing poor data quality in your enterprise.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

BDNA

Navigating The Data Quality Challenges of CRM
sponsored by Trillium Software
WHITE PAPER: This white paper examines why data quality is essential to effective CRM initiatives and provides ideas on how you can achieve customer data integrity.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Trillium Software

AIIM: Information Governance is too Important to be Left to Humans
sponsored by OpenText
WHITE PAPER: In this white paper, Chief Analyst at AIIM, Doug Miles, provides insight into survey results that reveal the importance of data governance today. Also, learn the effectiveness of automated classification and the impact on risks and costs.
Posted: 20 Apr 2016 | Published: 31 Dec 2015

OpenText

Magic Quadrant for Business Intelligence and Analytics Platforms
sponsored by Microsoft
WHITE PAPER: The shift from IT-led enterprise reporting to self-service analytics has radically transformed the BI and analytics vendor landscape. This Gartner Magic Quadrant evaluates 24 major BI and analytics platform vendors, revealing the strengths and weaknesses of each.
Posted: 06 Apr 2016 | Published: 04 Feb 2016

Microsoft

Putting Managed File Transfer in Perspective
sponsored by IBM
WHITE PAPER: This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

IBM
26 - 50 of 419 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement