IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance Reports
101 - 125 of 825 Matches Previous Page  |  Next Page
Assessing the Opportunities Presented by the Modern Enterprise Archive
sponsored by Druva Software
ANALYST REPORT: Discover business benefits your enterprise can achieve with a modern archive solution. In this report, discover how enterprise archive solutions evolved from simply being a site of preservation to driving business value through expanded archive funtionality. Additionally, realize the top 5 value proprositions of next-gen data archive solutions.
Posted: 16 May 2016 | Published: 30 Nov 2015

Druva Software

How ShareFile Works to Prevent Data Loss and Meet Compliance Requirements
sponsored by Citrix
RESOURCE: To prevent costly data leakage, data loss prevention tools must be integrated into your file sharing system. This will enable you to put restrictions on what information can leave your network giving you full visibility into your data's whereabouts. Learn more about content-aware sharing to better protect your organization.
Posted: 16 May 2016 | Published: 12 May 2015

Citrix

Protecting Corporate Data Beyond the Firewall
sponsored by Druva Software
WHITE PAPER: Learn how a new approach to data governance can help you address the growing challenges of data tracking and monitoring beyond the corporate firewall to meet regulatory and legal requirements.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

What you need to know about enterprise endpoint backup
sponsored by Druva Software
RESOURCE: Access this in-depth analysis of endpoint backup vendors, highlighting the differences in mobile device support, performance, backup frequency, scalability, security, and more. Ease your enterprise's decision-making process in determining the right endpoint backup service for your data.
Posted: 13 May 2016 | Published: 12 Nov 2015

Druva Software

Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' collaboration demands are rising, making it hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014

Citrix

Case Study: Meet the Mobility, Collaboration and Security Needs of Your Users
sponsored by Citrix
VIDEO: When a massive amount of information is being shared on a daily basis, it is critical that your file sync and share system is up to par. Watch this video now to learn how one investment company enabled secure file sharing and mobility to meet the collaboration needs of users.
Posted: 13 May 2016 | Premiered: 23 Feb 2015

Citrix

A Secure Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

The Demand for Hybrid Online File Sharing
sponsored by Citrix
RESEARCH CONTENT: In this report, learn how the OFS market is changing and uncover critical insight into the adaptions that must be made to keep clients happy. Read on to uncover why so many businesses want their OFS vendor offerings to include greater choice with how data is stored and where.
Posted: 10 May 2016 | Published: 31 Dec 2014

Citrix

Top 5 requirements for secure enterprise file sync and sharing
sponsored by Citrix
WHITE PAPER: The mobile data access challenge poses both risk and opportunities for IT. The use of personal file sharing makes it hard to maintain security of sensitive information. Discover how IT can help employees work and collaborate more effectively from anywhere while supporting the evolution of business mobility enterprise-wide.
Posted: 10 May 2016 | Published: 29 Apr 2016

Citrix

Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add
sponsored by VMware
WHITE PAPER: Data center attacks are on the rise, and physical security and firewalls aren't enough. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate into your network security.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

ShareFile Enterprise: Provide Industry-leading Security
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Secure file sharing in the enterprise
sponsored by Citrix
WHITE PAPER: As companies grow globally and more dispersed, file sharing becomes more critical. If an organization does not provide a solution, employees will find one -- or more -- for themselves. Access this white paper to learn about ensuring secure data sharing and a file sharing solution that solves several sharing problems.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Case Study: County of San Mateo Meets Data Regulation Needs with Data Management Software
sponsored by Commvault
VIDEO: Watch this brief webcast now to learn about the County of San Mateo's implementation of a data management software that balanced their different legal and regulatory requirements for data protection. See how this solution can provide your enterprise with the flexibility needed to meet changing customer requirements and government regulations.
Posted: 09 May 2016 | Premiered: 16 Oct 2015

Commvault

Top 10 ShareFile Enterprise Features IT Teams Can’t Live Without
sponsored by Citrix
WEBCAST: When choosing enterprise file sharing, it is important to consider what features your organization will rely on most. This video highlights the top 10 enterprise file sync and sharing features IT teams can't live without and how one global logistics company took advantage of these features.
Posted: 06 May 2016 | Premiered: May 20, 2015

Citrix

DLP and EFSS: Is your data safe?
sponsored by Citrix
WEBCAST: You can't afford to let data loss prevention (DLP) take a backseat when it comes to secure file sync and sharing. Discover how advanced security features address and integrate DLP, how to protect your corporate data from unauthorized sharing, and more.
Posted: 06 May 2016 | Premiered: May 13, 2015

Citrix

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Get Ahead of Your Next Security Breach
sponsored by One Identity
WHITE PAPER: An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

One Identity

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Customer Story: Kuwait Petroleum Corporation Needed Control of Company Data Sharing
sponsored by Citrix
CASE STUDY: Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.
Posted: 04 May 2016 | Published: 31 Dec 2013

Citrix

Case Study: Public Consulting Group Meets Governance, DR, and SLA Requirements with Efficient Data Management
sponsored by Commvault
VIDEO: In this case study, witness how a consulting group utilized a data management solution to seamlessly meet compliance, governance, and disaster recovery requirements for their customers. Watch now to learn more.
Posted: 04 May 2016 | Premiered: 21 Oct 2015

Commvault

Information Sharing Defeats Data Security Threats
sponsored by Anomali
WHITE PAPER: Discover how to leverage information sharing to quell security problems. Learn how to share information with trusted peers, adhere to standards and integrate with popular security software.
Posted: 04 May 2016 | Published: 01 Apr 2016

Anomali

Cloud computing storage key management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 04 May 2016 | Published: 04 May 2016

ComputerWeekly.com

Transforming the Data Center: SimpliVity delivers hyperconverged platform with native data protection
sponsored by SimpliVity
ANALYST REPORT: Discover from real world examples how hyperconvergence not only compresses and stores data, but also thoroughly protects it. Learn how you can eliminate your traditional data protection tools and replace them with an all-in-one storage option.
Posted: 10 May 2016 | Published: 01 Jan 2016

SimpliVity

How to Create a Successful Data Archiving Strategy
sponsored by ArcMail Technology
EGUIDE: This e-guide uncovers the technical tools and processes you should look into for an effective data archiving strategy. Access now to discover the benefits a successful data strategy can bring to your enterprise, including reduced backup windows, knowledge retention, improved system performance, and more.
Posted: 06 May 2016 | Published: 04 May 2016

ArcMail Technology
101 - 125 of 825 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement