IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance White Papers (View All Report Types)
51 - 75 of 443 Matches Previous Page  |  Next Page
Clustering for Axway SecureTransport
sponsored by Axway
WHITE PAPER: Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Get proven expertise to leverage an enhanced MFT gateway that supports Standard Clustering and Enterprise Clustering to meet a wide range of capacity requirements and help your organization ensure business continuity.
Posted: 15 Jun 2016 | Published: 31 Dec 2012

Axway

Integrating Data Protection and Active Archiving
sponsored by HGST
WHITE PAPER: Learn how to easily integrate data protection with scalability. An integrated solution demonstrates data availability at scale, manageability, disaster recovery capabilities and simplicity agreeable to the demands of current and future enterprise data center environments.
Posted: 13 Jun 2016 | Published: 01 Apr 2016

HGST

Critical Capabilities for Enterprise Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: IT security leaders deploy enterprise data loss prevention (DLP) for three major use cases: regulatory compliance, intellectual property protection and increased visibility into how users treat sensitive data. This research evaluates DLP products for these three use cases, based on nine critical capabilities. Read on to learn more.
Posted: 31 May 2016 | Published: 31 May 2016

Digital Guardian

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

BI That's Compatible with the Microsoft Stack: Get Optimal Value from Your Investments
sponsored by Pyramid Analytics
WHITE PAPER: Discover a BI platform that's compatible with the Microsoft data stack, offers self-service capabilities, and empowers you to share trusted BI content. Learn how you can deliver enterprise-grade governance and security, deploy on-premises or private cloud, and more.
Posted: 20 May 2016 | Published: 20 May 2016

Pyramid Analytics

Advance Enterprise Analytics with Self-Service and Governance
sponsored by Pyramid Analytics
WHITE PAPER: Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

Simple, Secure Encryption in the Era of Big Data
sponsored by Gemalto
WHITE PAPER: Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

A Step-By-Step Guide to Finding the Right Data Protection System
sponsored by Gemalto
WHITE PAPER: Learn how to deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it be data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Enable Better Decisions for Everyone in Your Organization
sponsored by Pyramid Analytics
WHITE PAPER: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.
Posted: 18 May 2016 | Published: 18 May 2016

Pyramid Analytics

The Need for Third Party Archiving
sponsored by Commvault
WHITE PAPER: Third-party email archiving solutions can address customer needs that basic archiving solutions, such as Microsoft's Office 365, can't achieve. Discover the benefits your enterprise can achieve with a third-party archiving solution, such as storage flexibility, advanced search capabilities, full audit of the archive and more.
Posted: 16 May 2016 | Published: 31 Mar 2015

Commvault

Protecting Corporate Data Beyond the Firewall
sponsored by Druva Software
WHITE PAPER: Learn how a new approach to data governance can help you address the growing challenges of data tracking and monitoring beyond the corporate firewall to meet regulatory and legal requirements.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' collaboration demands are rising, making it hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014

Citrix

A Secure Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

Top 5 requirements for secure enterprise file sync and sharing
sponsored by Citrix
WHITE PAPER: The mobile data access challenge poses both risk and opportunities for IT. The use of personal file sharing makes it hard to maintain security of sensitive information. Discover how IT can help employees work and collaborate more effectively from anywhere while supporting the evolution of business mobility enterprise-wide.
Posted: 10 May 2016 | Published: 29 Apr 2016

Citrix

Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add
sponsored by VMware
WHITE PAPER: Data center attacks are on the rise, and physical security and firewalls aren't enough. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate into your network security.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

ShareFile Enterprise: Provide Industry-leading Security
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Secure file sharing in the enterprise
sponsored by Citrix
WHITE PAPER: As companies grow globally and more dispersed, file sharing becomes more critical. If an organization does not provide a solution, employees will find one -- or more -- for themselves. Access this white paper to learn about ensuring secure data sharing and a file sharing solution that solves several sharing problems.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Get Ahead of Your Next Security Breach
sponsored by One Identity
WHITE PAPER: An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

One Identity

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Information Sharing Defeats Data Security Threats
sponsored by Anomali
WHITE PAPER: Discover how to leverage information sharing to quell security problems. Learn how to share information with trusted peers, adhere to standards and integrate with popular security software.
Posted: 04 May 2016 | Published: 01 Apr 2016

Anomali

5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Build a Reliable, Accurate CMDB by Addressing Data Quality
sponsored by BDNA
WHITE PAPER: Discover the top data quality issues derailing your configuration management database (CMDB) initiatives. Learn how you can build and maintain an accurate, reliable CMDB by taking the steps to address poor data quality.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Streamline Data Security Management
sponsored by IBM
WHITE PAPER: Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM
51 - 75 of 443 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement