IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance Reports
26 - 50 of 801 Matches Previous Page  |  Next Page
9 steps to build a better insider threat program
sponsored by Forcepoint
WEBCAST: While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.
Posted: 06 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

Augment and Extend the Life of Your Data Warehouse
sponsored by IBM
WHITE PAPER: Learn how organizations currently using a high powered data warehouse appliance can augment and extend the life of their data warehouses with industry-leading cloud data services. Discover tips for "future-proofing" your data warehouse and more.
Posted: 05 Jul 2016 | Published: 31 Oct 2015

IBM

Move Data at Maximum Possible Speed
sponsored by IBM
VIDEO: Relying on TCP-based transport technologies to transfer data over today's WANs is insufficient due to its severe performance bottlenecks. Discover how you can overcome these bottlenecks and transport large files and data sets at maximum speeds over long distances by fully utilizing available bandwidth.
Posted: 01 Jul 2016 | Premiered: 01 Jul 2016

IBM

Fast Data Delivery and Exchange: Comparing Performance Transport Software
sponsored by IBM
WHITE PAPER: See how traditional TCP-based transport technologies measure up against an innovative bulk data transport technology built on the principles of bandwidth fairness and congestion avoidance. Plus, discover how you can maximize both the speed and reliability of your data delivery.
Posted: 01 Jul 2016 | Published: 31 Jan 2015

IBM

Data Security for the Digital Businesses
sponsored by HPE and Intel®
VIDEO: How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and Intel®

Simple, Powerful, Integrated Data Prep and Movement in the Cloud
sponsored by IBM
WHITE PAPER: Unburden your IT department by updating your cloud services and enabling both technical and non-technical business users to derive useful insights from data. Discover how you can ensure data quality with simple data preparation and movement services in the cloud.
Posted: 30 Jun 2016 | Published: 31 Dec 2015

IBM

Successfully Migrating Personnel Data from SAP ERP Human Capital Management to Employee Central
sponsored by Accenture
WHITE PAPER: Before migrating personnel data to SAP's Employee Central, adjustments and modifications are necessary to legacy SAP ERP HCM data. This report introduces a solution that converts data for migration that focuses on quality, consistency, and protection against risk and errors.
Posted: 30 Jun 2016 | Published: 31 Dec 2015

Accenture

How CISOs Tackle Insider Threat Data Protection
sponsored by Forcepoint
WEBCAST: Threats from within are a high priority for CISOs; even your best employees can put your data at risk. What technologies can help protect you and your employees? Hear how a real-world CISO plans, implements, and manages an insider threat program.
Posted: 30 Jun 2016 | Premiered: May 1, 2016

Forcepoint

Privileged Users
sponsored by Forcepoint
WHITE PAPER: Damage caused by Privileged Users is the most extensive, hardest to mitigate, and hardest to detect. However, a solution exists to mitigate the threat of Privileged User abuse. Read the "Privileged Users: Superman or Superthreat?" whitepaper for best practices and strategies for mitigating the threat within your organization.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Understanding Insurance Industry Data Warehousing Challenges
sponsored by IBM
WHITE PAPER: Learn how enhancements in the areas of life insurance and workers' compensation help companies address economic and technological challenges. Plus, discover how to build an effective data warehouse that provides a flexible, scalable solution which enables the consolidation and integration of data.
Posted: 30 Jun 2016 | Published: 30 Nov 2014

IBM

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Data Refinement: Facilitating the Data-Driven Organization
sponsored by IBM
RESEARCH CONTENT: This study by Forrester yielded 4 key findings about data refinement done right. Discover how a good data refinement strategy can help drive business decisions and give your company a competitive edge.
Posted: 30 Jun 2016 | Published: 30 Jun 2015

IBM

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
PODCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

The Cost of Unintentional Insider Threat
sponsored by Forcepoint
WHITE PAPER: A high rate of Unintentional Insider Threats (UIT) sheds light on the demands of today's workplace culture in the United States. Work cultures are unlikely to change anytime soon, but there are tools and programs that can help any work environment with a UIT problem. To find out more, read the report.
Posted: 28 Jun 2016 | Published: 13 Jan 2016

Forcepoint

Top 10 Reasons to choose EMC Data Protection Solutions
sponsored by Richardson Eyres
WHITE PAPER: Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.
Posted: 23 Jun 2016 | Published: 01 May 2016

Richardson Eyres

The Axway MFT Solution Transcript
sponsored by Axway
WHITE PAPER: It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.
Posted: 23 Jun 2016 | Published: 01 May 2016

Axway

MFT as a Shared Service- Transcript
sponsored by Axway
TRANSCRIPT: Learn how to meet this bandwidth demand head-on. See how managed file transfer as a service can actually help industries in trying to navigate this explosion of data in the digital space more clearly and securely.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

4 Reasons Your Metadata is Broken
sponsored by Tableau Software
WHITE PAPER: Learn how a new approach to metadata can fundamentally improve your business. Discover the 4 signs that your metadata is broken and find out how you can benefit from deploying self-service analytics.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Tableau Software

Data Refinement: Facilitating the data-driven organization
sponsored by IBM
WHITE PAPER: Packed with findings from architecture and app development pros, this Forrester Research report will help development and IT teams better understand why a good data refinement strategy is a business imperative, why architects and developers don't' see data the same way, where the hybrid cloud fits in when defining data refinement success, and more.
Posted: 22 Jun 2016 | Published: 30 Jun 2015

IBM

AIIM Infographic: Information Governance is Too Important to be Left to Humans
sponsored by Hewlett Packard Enterprise
RESOURCE: See the results of a recent survey in this infographic that point to the importance of automation to the process of modern information governance. Learn how automation can improve searchability, productivity, and more.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

Hewlett Packard Enterprise

Success Story Video: State of California
sponsored by Axway
VIDEO: Find out how the State of California was able to about a managed file transfer (MFT) system to centrally manage and monitor secure file transfers across all their web sites and applications for all their agencies.
Posted: 17 Jun 2016 | Premiered: 01 May 2016

Axway

Clustering for Axway SecureTransport
sponsored by Axway
WHITE PAPER: Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Get proven expertise to leverage an enhanced MFT gateway that supports Standard Clustering and Enterprise Clustering to meet a wide range of capacity requirements and help your organization ensure business continuity.
Posted: 15 Jun 2016 | Published: 31 Dec 2012

Axway

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Log Monitoring & Analysis: Strengthen Information Security While Respecting User Privacy
sponsored by Intersect Alliance
EGUIDE: Log monitoring and analysis tools can be used to bolster information security and improve incident response without infringing on user privacy. In this expert e-guide, security pros evaluate options based on criteria such as alerts and reporting capabilities.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intersect Alliance

Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.
26 - 50 of 801 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement