IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance Reports
1 - 25 of 845 Matches Previous Page  |  Next Page
SLA-Driven Data Protection Modernization: An ESG Video Interview
sponsored by IBM
VIDEO: In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.
Posted: 20 Sep 2016 | Premiered: 31 Mar 2016

IBM

Move from Manual Reporting to Real-Time Automated Analytics
sponsored by Yellowfin
CASE STUDY: This case study explores how by implementing an automated SaaS platform Interrogare ultimately saved 72 hours' worth of work each month. See how they were able to gather more accurate insights, while moving from delivering clients static monthly reports, to providing self-service access to real-time data, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Yellowfin

Data Access Governance Solutions On-Demand Demo
sponsored by STEALTHbits
WEBCAST: This 60-minute webinar will teach you how your organization can implement a concrete data access governance program that won't break your back, or the bank. You'll learn both tactical and strategic approaches to unstructured data management and have your most important questions answered along the way.
Posted: 14 Sep 2016 | Premiered: Dec 31, 2015

STEALTHbits

Open Access
sponsored by STEALTHbits
WHITE PAPER: Discover how to discern who has access to your unstructured data and see all open shares on your network. Protect against malicious access, reduce security risk, fulfill compliance requirements and decrease operations expense by first accessing this valuable resource.
Posted: 13 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Buyer's Guide - DAG
sponsored by STEALTHbits
RESOURCE: This white paper will help choose the best available Data Access Governance solution. The information contained within can be used in creating a request for information (RFI) or request for proposal (RFP) and evaluating Data Access Governance products.
Posted: 13 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Critical Capabilities for Business Intelligence and Analytics Platforms
sponsored by Birst
WHITE PAPER: This Gartner report is the definitive guide to understanding which vendors offer the best platform for your specific use case. You'll see how to create a BI program which is completely web-based for ease of access across any hardware, how you can implement an easy-to-access agile analytics network, and more.
Posted: 12 Sep 2016 | Published: 31 Mar 2016

Birst

3 Steps to Getting Data Access Governance off Your To Do List
sponsored by STEALTHbits
WHITE PAPER: Data Access Governance (DAG) has been that to-do item IT Security has had for years, but they just kept pushing it aside for other goals. Today, however, there are strategies which can make DAG more approachable. In this free White Paper we are going to break DAG down into 3 steps that you can use to finally check this big one off your list.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Build a Data Access Governance Program to Control Unstructured Data
sponsored by STEALTHbits
WHITE PAPER: Following this 5 step plan will help ensure your organization has its data secured. By the end, you will know how to survey all your organization's data, focus attention where it matters most, get the right stakeholders involved, review and remediate access, and arrive at a working security model to meet both security and compliance needs.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Next-Generation Archiving: How to Extract Intelligence from Your Electronic Archives
sponsored by Proofpoint, Inc.
WHITE PAPER: Archiving tools have long served as basic storage management tools, storing data for "just in case." Next-gen tools are all about utilizing that data to derive insight and intelligence. Learn about the past, and discover the future, of archiving tools, and devise your organization's strategy to make the most of this technology.
Posted: 08 Sep 2016 | Published: 31 Aug 2016

Proofpoint, Inc.

Blue Hill Research: Enterprise BI Essentials: The Convergence of Self-Service Autonomy and Scalability
sponsored by IBM
WHITE PAPER: This 2016 Blue Hill Research analyst report explores how a hybrid BI approach provides support for analyst-built models and IT-built models, model-based analysis with both freeform and natural-language exploration, and self-service agility.
Posted: 08 Sep 2016 | Published: 30 Jun 2016

IBM

The ROI of Enterprise-Wide E-Discovery: How To Save 5 Million Dollars
sponsored by Proofpoint, Inc.
MICROSITE: Access this resource to learn how to maximize your e-discovery ROI. You will learn the difference between collection and review savings. See how your organization can get an ROI of close to 5 million dollars annually.
Posted: 07 Sep 2016 | Published: 19 Oct 2015

Proofpoint, Inc.

Simple, Powerful, and Practical Analytics for a New Generation of Users
sponsored by IBM
WHITE PAPER: This report examines how one analytics platform has developed to address the emerging needs of modern BI. Find out how you can increase your core analytics power while boosting agility and maintaining good data governance practices.
Posted: 07 Sep 2016 | Published: 29 Feb 2016

IBM

Eckerson Group: Governed Data Discovery: Balancing Flexibility and Standards
sponsored by IBM
RESEARCH CONTENT: This Eckerson report argues that top-down and bottom-up BI are flip sides of the same coin and proposes that businesses need to devise organizational, architectural, and technical frameworks that harmonize these polar opposites. Discover how modern BI platforms help create a governed discovery environment and boost self-service capabilities.
Posted: 07 Sep 2016 | Published: 29 Feb 2016

IBM

Converged and Governed Analytics for the Masses
sponsored by IBM
RESOURCE: This report explores how one analytics platform has transformed to address the issue of reconciling consumer-grade usability and data accessibility with enterprise-caliber scale and trust. Discover the implications of self-service and its evolving role in analytics, as well as how to achieve accessible, agile insights.
Posted: 06 Sep 2016 | Published: 29 Feb 2016

IBM

Cloud Services Take Off, GRC Doesn't
sponsored by SearchSecurity.com
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

SearchSecurity.com

Simplifying and Accelerating Master Data Management
sponsored by Information Builders
WHITE PAPER: Many MDM projects are failing due to time and effort requirements. This white paper discusses the problems that face traditional MDM approaches and data mastering innovations. Leverage best practices and new technology to improve the view of your data across the enterprise.
Posted: 30 Aug 2016 | Published: 31 Dec 2015

Information Builders

The Top 5 "Worst Practices" In Business Intelligence
sponsored by Information Builders
WHITE PAPER: Even the best-run businesses in the world can commit the common missteps that lead to lukewarm BI performance. This white paper identifies and explores the 5 "worst practices" that contribute to poor BI deployments. Find out how they negatively impact BI from both a technology and a business perspective and learn how to avoid them.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

Information Builders

Information Management and MDM: Getting the Most from Clinical Data
sponsored by Information Builders
WHITE PAPER: This white paper examines the obstacles healthcare payers experience when planning and implementing a strategy for collecting, managing, and exchanging clinical data for value-based care. Discover how to unlock truly actionable data with an integrated approach to information management, data quality, master data management, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Information Builders

The 8 Worst Practices in Master Data Management and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: This white paper explores the 8 "worst practices" of master data management. Find out how to navigate these obstacles on the road to a successful MDM and data governance program for big data.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Information Builders

7 Key Challenges to Value-Based Care: Ensuring Patient-Centered Care With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper explores how to address some of the challenges of moving towards value-based healthcare with a strategy for improving the way patient data is collected, managed, and exchanged. Access now to find out more about an integrated approach to master data management, data quality, information management, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Information Builders

Inside Job: A Better Strategy to Stop Insider Threats
sponsored by Infor
WHITE PAPER: Insider threats are the greatest risk to top-of-the-line cybersecurity. Your data and predictive analytics may be the best tools to protect against insider threats. This guide to insider threats walks you through a brief history of these threats, who could be considered insiders, and how to approach these issues now as well as in the future.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Infor

From Data to Action: Your Guide to Analytics
sponsored by Intel Corporation
ANALYST REPORT: You've followed the big data trend and collected more data than you may need—now what? In this comprehensive guide to analytics, learn everything from using data to propel your business forward, to extracting value from almost any analytics project, to securing big data.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Intel Corporation

Optimize Supply Chain Management with an In-Memory Data Platform
sponsored by Intel Corporation
WHITE PAPER: Legacy supply chains can suffer from issues like data latency, data fragmentation, and a lack of scalability, which can hold businesses back in an increasingly fast-paced, data-driven world. Find out how to empower supply chain management teams with agility, real-time business intelligence, and predictive analytics capabilities.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

Onapsis Research Labs: SAP Systems Security Analysis
sponsored by Onapsis
WHITE PAPER: This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 22 Aug 2016 | Published: 29 Feb 2016

Onapsis

6 Steps to Building Your Big Data Strategy
sponsored by IBM
WHITE PAPER: This white paper explores 6 steps to creating an effective big data analytics platform that will allow you to reduce capital costs and increase the efficiency of your employees. Learn how to define your business' objectives in using big data analytics and how to experiment with multiple uses for your big data.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

IBM
1 - 25 of 845 Matches Previous Page    1 2 3 4    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement