This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance.
Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
This briefing from law-firm DLA Piper looks at the main types of data centre services that are available on the market, common pitfalls and key legal and commercial issues to consider.
This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
This edition of the CIO Decisions e-zine demonstrates how BI and data analytics are dramatically changing the way businesses interact with their data. Inside, learn how the Obama campaign used "microtargeting" techniques to read the polls and understand how they were changing and evolving during the campaign.
The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Law firms have had to develop new strategies to compete and win in a legal market that contains greater uncertainty than any that has come before it. This paper will briefly outline strategies for success in the evolving legal marketplace.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines