Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Computer Crimes  >  

Forensic Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Forensic Analysis White Papers (View All Report Types)
 
MarketScope for E-Discovery Software Product Vendors
sponsored by Clearwell Systems
WHITE PAPER: Recession has accelerated the move to in-house e-discovery and more companies have brought, or are considering bringing, e-discovery in-house. This report will help enterprises build a business case, create a list of possible vendors and determine which ones best meet their needs.
Posted: 18 Nov 2010 | Published: 21 Dec 2009

Clearwell Systems

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group

Ten Ways Hackers Breach Security
sponsored by Global Knowledge
WHITE PAPER: Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
Posted: 09 Feb 2007 | Published: 01 Jan 2007

Global Knowledge

Information Workplace Platforms: Oracle Vs. Microsoft
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn about Oracle and Microsoft workplace platforms strengths and weaknesses.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Oracle Corporation

What is FakeAV?
sponsored by Sophos, Inc.
WHITE PAPER: FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.
Posted: 25 Jun 2010 | Published: 24 May 2010

Sophos, Inc.

Expanding Active Decision-Making: The Power of Integrating Business Rules and Events
sponsored by Red Hat and JBoss
WHITE PAPER: This white paper demonstrates how using JBoss Enterprise BRMS, business analysts, developers, and integrators can create and manage rules and events in a single product using a shared set of authoring tools.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Red Hat and JBoss

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

The Growing Importance of E-Discovery on Your Business
sponsored by Google Apps
WHITE PAPER: The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

Google Apps

IBM Flexible IT Work Environment
sponsored by IBM
WHITE PAPER: With IBM Flexible IT Work Environment solutions, employees can communicate with key individuals, groups or departments using consistent Web interfaces.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks
sponsored by OpenText
WHITE PAPER: This white paper explores the potential compliance related benefits to adopting fax server technology.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

OpenText
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement