IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance White Papers (View All Report Types)
76 - 100 of 451 Matches Previous Page  |  Next Page
Enable Better Decisions for Everyone in Your Organization
sponsored by Pyramid Analytics
WHITE PAPER: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.
Posted: 18 May 2016 | Published: 18 May 2016

Pyramid Analytics

The Need for Third Party Archiving
sponsored by Commvault
WHITE PAPER: Third-party email archiving solutions can address customer needs that basic archiving solutions, such as Microsoft's Office 365, can't achieve. Discover the benefits your enterprise can achieve with a third-party archiving solution, such as storage flexibility, advanced search capabilities, full audit of the archive and more.
Posted: 16 May 2016 | Published: 31 Mar 2015

Commvault

Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' collaboration demands are rising, making it hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014

Citrix

A Secure Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

Top 5 requirements for secure enterprise file sync and sharing
sponsored by Citrix
WHITE PAPER: The mobile data access challenge poses both risk and opportunities for IT. The use of personal file sharing makes it hard to maintain security of sensitive information. Discover how IT can help employees work and collaborate more effectively from anywhere while supporting the evolution of business mobility enterprise-wide.
Posted: 10 May 2016 | Published: 29 Apr 2016

Citrix

Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add
sponsored by VMware
WHITE PAPER: Data center attacks are on the rise, and physical security and firewalls aren't enough. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate into your network security.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

ShareFile Enterprise: Provide Industry-leading Security
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Secure file sharing in the enterprise
sponsored by Citrix
WHITE PAPER: As companies grow globally and more dispersed, file sharing becomes more critical. If an organization does not provide a solution, employees will find one -- or more -- for themselves. Access this white paper to learn about ensuring secure data sharing and a file sharing solution that solves several sharing problems.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Information Sharing Defeats Data Security Threats
sponsored by Anomali
WHITE PAPER: Discover how to leverage information sharing to quell security problems. Learn how to share information with trusted peers, adhere to standards and integrate with popular security software.
Posted: 04 May 2016 | Published: 01 Apr 2016

Anomali

5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Build a Reliable, Accurate CMDB by Addressing Data Quality
sponsored by BDNA
WHITE PAPER: Discover the top data quality issues derailing your configuration management database (CMDB) initiatives. Learn how you can build and maintain an accurate, reliable CMDB by taking the steps to address poor data quality.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Streamline Data Security Management
sponsored by IBM
WHITE PAPER: Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM

Importance of DQ in the Age of Digital Transformation
sponsored by Trillium Software
WHITE PAPER: Data is at the heart of digital transformation, and as an essential element in the majority of business initiatives, organizations need to ensure that their data is accurate. Download this white paper now to discover how data quality tools can ensure a successful digital transformation for your business.
Posted: 26 Apr 2016 | Published: 26 Apr 2016

Trillium Software

Best Practices for Enterprise IT Data Quality
sponsored by BDNA
WHITE PAPER: This white paper explores how you can successfully accelerate data maturity by leveraging 3 core capabilities: reference language, data abstraction, and content refresh processes. Plus, learn a 3-phased approach to addressing poor data quality in your enterprise.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

BDNA

Information Governance: Too Important to be Left to Humans
sponsored by OpenText
WHITE PAPER: In this report, Doug Miles, Chief Analyst at AIIM, provides insight the importance of information and data governance today. Find out just how effective automated classification really is and learn the impact on risks and costs.
Posted: 20 Apr 2016 | Published: 31 Dec 2015

OpenText

Realize the value of data protection at scale
sponsored by HGST
WHITE PAPER: In this white paper, learn how to meet today's data protection with proper data management software and targeted storage systems that ensure integrity, scale and high availability. Access now to learn how you can simplify your backup strategy.
Posted: 31 Mar 2016 | Published: 01 Jan 2016

HGST

Prepare and Maintain Your Data: Data Quality and Master Data Management in a Hybrid Environment
sponsored by IBM
WHITE PAPER: Discover how you can prepare and maintain your data in a hybrid environment with data quality and master data management tools. Learn how you can achieve actionable insights with top-notch data.
Posted: 16 Mar 2016 | Published: 30 Apr 2015

IBM

Network-based Security: Global Visibility is the Difference
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Point security solutions aren't enough to keep up with increasingly diverse and sophisticated cyberthreats. Access this brief resource to learn how a network-based security strategy can detect threats and stop them before they affect your business.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Top Identity Governance and Administration Vendors Examined
sponsored by IBM
WHITE PAPER: In this Gartner Magic Quadrant, you will explore the strengths of the leading IGA platforms and vendors. Access now to discover how to evaluate your needs and find which system best fits into your IAM and IGA strategy.
Posted: 11 Mar 2016 | Published: 12 Jan 2015

IBM

Transform Your Data with Anzo Smart Data Manager
sponsored by Cambridge Semantics
WHITE PAPER: This white paper highlights a data management tool that allows enterprises to collect data sources into a centralized catalog and flexibly add the amount of metadata. Access now to see how this data platform can help your enterprise turn your data swamp into a data lake.
Posted: 09 Mar 2016 | Published: 09 Mar 2016

Cambridge Semantics

Putting Managed File Transfer in Perspective
sponsored by IBM
WHITE PAPER: This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

IBM

Developing a Data Integration and Lifecycle Management Strategy for a Hybrid Environment
sponsored by IBM
WHITE PAPER: In this white paper, learn how you can adopt a good hybrid information governance strategy by following 4 primary priorities. Then explore the fourth priority in-depth to learn what defines an integration and lifecycle strategy.
Posted: 16 Mar 2016 | Published: 30 Apr 2015

IBM

Building A Strong Foundation with Big Data Integration
sponsored by IBM
WHITE PAPER: This infographic illustrates 3 different approaches to big data integration. Read on to decide which approach provides the best foundation for integration of your big data, and decide if Hadoop alone is adequate enough to manage the data influx.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

IBM
76 - 100 of 451 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement