IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance Reports
126 - 150 of 828 Matches Previous Page  |  Next Page
Case Study: Public Consulting Group Meets Governance, DR, and SLA Requirements with Efficient Data Management
sponsored by Commvault
VIDEO: In this case study, witness how a consulting group utilized a data management solution to seamlessly meet compliance, governance, and disaster recovery requirements for their customers. Watch now to learn more.
Posted: 04 May 2016 | Premiered: 21 Oct 2015

Commvault

Information Sharing Defeats Data Security Threats
sponsored by Anomali
WHITE PAPER: Discover how to leverage information sharing to quell security problems. Learn how to share information with trusted peers, adhere to standards and integrate with popular security software.
Posted: 04 May 2016 | Published: 01 Apr 2016

Anomali

Cloud computing storage key management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 04 May 2016 | Published: 04 May 2016

ComputerWeekly.com

5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Build a Reliable, Accurate CMDB by Addressing Data Quality
sponsored by BDNA
WHITE PAPER: Discover the top data quality issues derailing your configuration management database (CMDB) initiatives. Learn how you can build and maintain an accurate, reliable CMDB by taking the steps to address poor data quality.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Best Practices for Managing Unstructured Data
sponsored by IBM
EGUIDE: Structured or not, it can be difficult to extract value out of the massive amounts of data enterprises collect. This expert e-guide provides best practices for managing unstructured data. Discover crucial tips to help you minimize irrelevant content, extract insight from unstructured data, combine structured and unstructured data, and more.
Posted: 28 Apr 2016 | Published: 25 Apr 2016

IBM

Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER: This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Streamline Data Security Management
sponsored by IBM
WHITE PAPER: Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM

Importance of DQ in the Age of Digital Transformation
sponsored by Trillium Software
WHITE PAPER: Data is at the heart of digital transformation, and as an essential element in the majority of business initiatives, organizations need to ensure that their data is accurate. Download this white paper now to discover how data quality tools can ensure a successful digital transformation for your business.
Posted: 26 Apr 2016 | Published: 26 Apr 2016

Trillium Software

Best Practices for Enterprise IT Data Quality
sponsored by BDNA
WHITE PAPER: This white paper explores how you can successfully accelerate data maturity by leveraging 3 core capabilities: reference language, data abstraction, and content refresh processes. Plus, learn a 3-phased approach to addressing poor data quality in your enterprise.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

BDNA

Information Governance: Too Important to be Left to Humans
sponsored by OpenText
WHITE PAPER: In this report, Doug Miles, Chief Analyst at AIIM, provides insight the importance of information and data governance today. Find out just how effective automated classification really is and learn the impact on risks and costs.
Posted: 20 Apr 2016 | Published: 31 Dec 2015

OpenText

Create a Solid Incident Response Plan and Respond to Threats Efficiently
sponsored by Dell SecureWorks
EGUIDE: In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers
Posted: 20 Apr 2016 | Published: 18 Apr 2016

Dell SecureWorks

Develop a strong IAM strategy for third-party vendors
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide presents three in-depth looks at managing third-party IAM. You will learn about recent data breaches and how third-parties often prove to be the access point for hackers.
Posted: 12 Apr 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Realize the value of data protection at scale
sponsored by HGST
WHITE PAPER: In this white paper, learn how to meet today's data protection with proper data management software and targeted storage systems that ensure integrity, scale and high availability. Access now to learn how you can simplify your backup strategy.
Posted: 31 Mar 2016 | Published: 01 Jan 2016

HGST

HDAP: the Big Data LDAP Directory Storage
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.
Posted: 28 Mar 2016 | Premiered: Mar 15, 2016

Radiant Logic, Inc.

Dealing with Data Sovereignty in the Cloud Era
sponsored by VMware
WHITE PAPER: This white paper examines how you can gain back control of your data in the cloud era. Learn considerations for maintaining data sovereignty and security while future proofing your cloud strategy.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

VMware

Webinar - Network security without compromise
sponsored by Aruba Networks
WEBCAST: In this webcast, you will learn how to enhance network security, enforcement and a better user experience.
Posted: 23 Mar 2016 | Premiered: Feb 1, 2016

Aruba Networks

An Effective Data Archiving System Can Ease Backup Woes
sponsored by Veritas
EGUIDE: This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Veritas

Prepare and Maintain Your Data: Data Quality and Master Data Management in a Hybrid Environment
sponsored by IBM
WHITE PAPER: Access this white paper to discover how you can prepare and maintain your data in a hybrid environment with data quality and master data management tools. Learn how you can achieve actionable insights with top notch data.
Posted: 16 Mar 2016 | Published: 30 Apr 2015

IBM

Network-based Security: Global Visibility is the Difference
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Point security solutions aren't enough to keep up with increasingly diverse and sophisticated cyberthreats. Access this brief resource to learn how a network-based security strategy can detect threats and stop them before they affect your business.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Turning Strategy into Reality Means Putting APIs First
sponsored by Axway
RESOURCE: How do you know if your digital business strategy is effective? Access this self-assessment now to discover if your digital business strategy takes full advantage of API technologies.
Posted: 08 Mar 2016 | Published: 31 Dec 2015

Axway

How to keep Test Data current across your SAP landscape
sponsored by Attunity
WEBCAST: To ensure your testing is accurate and effective across the SAP environment, your business needs to be using the most current data. Discover how you can drastically reduce the time and effort it takes to acquire data by accessing this webinar now.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016

Attunity

Putting Managed File Transfer in Perspective
sponsored by IBM
WHITE PAPER: This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

IBM

Big Data Integration Made Easy
sponsored by IBM
VIDEO: Discover how your business can flexibly meet your unique information integration requirements – from data integration to data quality and data governance – to deliver trusted information to your mission critical business initiatives.
Posted: 16 Mar 2016 | Premiered: 30 Sep 2015

IBM

Transform Your Data with Anzo Smart Data Manager
sponsored by Cambridge Semantics
WHITE PAPER: This white paper highlights a data management tool that allows enterprises to collect data sources into a centralized catalog and flexibly add the amount of metadata. Access now to see how this data platform can help your enterprise turn your data swamp into a data lake.
Posted: 09 Mar 2016 | Published: 09 Mar 2016

Cambridge Semantics
126 - 150 of 828 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement