IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance Reports
76 - 100 of 827 Matches Previous Page  |  Next Page
MFT as a Shared Service- Transcript
sponsored by Axway
TRANSCRIPT: Learn how to meet this bandwidth demand head-on. See how managed file transfer as a service can actually help industries in trying to navigate this explosion of data in the digital space more clearly and securely.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

4 Reasons Your Metadata is Broken
sponsored by Tableau Software
WHITE PAPER: Learn how a new approach to metadata can fundamentally improve your business. Discover the 4 signs that your metadata is broken and find out how you can benefit from deploying self-service analytics.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Tableau Software

Data Refinement: Facilitating the data-driven organization
sponsored by IBM
WHITE PAPER: Packed with findings from architecture and app development pros, this Forrester Research report will help development and IT teams better understand why a good data refinement strategy is a business imperative, why architects and developers don't' see data the same way, where the hybrid cloud fits in when defining data refinement success, and more.
Posted: 22 Jun 2016 | Published: 30 Jun 2015

IBM

Success Story Video: State of California
sponsored by Axway
VIDEO: Find out how the State of California was able to about a managed file transfer (MFT) system to centrally manage and monitor secure file transfers across all their web sites and applications for all their agencies.
Posted: 17 Jun 2016 | Premiered: 01 May 2016

Axway

Clustering for Axway SecureTransport
sponsored by Axway
WHITE PAPER: Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Get proven expertise to leverage an enhanced MFT gateway that supports Standard Clustering and Enterprise Clustering to meet a wide range of capacity requirements and help your organization ensure business continuity.
Posted: 15 Jun 2016 | Published: 31 Dec 2012

Axway

Integrating Data Protection and Active Archiving
sponsored by HGST
WHITE PAPER: Learn how to easily integrate data protection with scalability. An integrated solution demonstrates data availability at scale, manageability, disaster recovery capabilities and simplicity agreeable to the demands of current and future enterprise data center environments.
Posted: 13 Jun 2016 | Published: 01 Apr 2016

HGST

Defend Against Threats of Global Operations
sponsored by Verizon
WHITE PAPER: Learn how the organization decided to replace the company's global remote-access infrastructure with platforms that allow it greater overall visibility to areas of increased vulnerability. Discover how to guard both your global network and application delivery platforms to help protect your reputation and maintain business continuity.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

The Definitive Guide to Data Loss Prevention
sponsored by Digital Guardian
EBOOK: This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts
Posted: 02 Jun 2016 | Published: 25 May 2016

Digital Guardian

Critical Capabilities for Enterprise Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: IT security leaders deploy enterprise data loss prevention (DLP) for three major use cases: regulatory compliance, intellectual property protection and increased visibility into how users treat sensitive data. This research evaluates DLP products for these three use cases, based on nine critical capabilities. Read on to learn more.
Posted: 31 May 2016 | Published: 31 May 2016

Digital Guardian

George Washington University Leverages Gigamon’s GigaSECURE to Improve Network Visibility and Security Posture
sponsored by Gigamon
CASE STUDY: Discover how GW was able to reduce the video steaming traffic on its network from one of the top five applications routing data through its security and application performance solutions to one of the top 25. The university is now able to take advantage of centralized security processing and scale across multiple data centers.
Posted: 24 May 2016 | Published: 01 Apr 2016

Gigamon

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Drive Informed Decisions with BI Dashboards
sponsored by Pyramid Analytics
RESOURCE: Discover a business intelligence platform that can enable flexibility and speed without sacrificing security or control. Learn about easily conducting complex analyses, generating rich visualizations, and scaling to match increased user needs.
Posted: 23 May 2016 | Published: 23 May 2016

Pyramid Analytics

BI That's Compatible with the Microsoft Stack: Get Optimal Value from Your Investments
sponsored by Pyramid Analytics
WHITE PAPER: Discover a BI platform that's compatible with the Microsoft data stack, offers self-service capabilities, and empowers you to share trusted BI content. Learn how you can deliver enterprise-grade governance and security, deploy on-premises or private cloud, and more.
Posted: 20 May 2016 | Published: 20 May 2016

Pyramid Analytics

Advance Enterprise Analytics with Self-Service and Governance
sponsored by Pyramid Analytics
WHITE PAPER: Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

Simple, Secure Encryption in the Era of Big Data
sponsored by Gemalto
WHITE PAPER: Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

A Step-By-Step Guide to Finding the Right Data Protection System
sponsored by Gemalto
WHITE PAPER: Learn how to deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it be data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Enable Better Decisions for Everyone in Your Organization
sponsored by Pyramid Analytics
WHITE PAPER: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.
Posted: 18 May 2016 | Published: 18 May 2016

Pyramid Analytics

FAQ: ShareFile Cloud for Healthcare
sponsored by Citrix
WHITE PAPER: Access now to witness how your healthcare organization can manage patient files and meet HIPAA requirements with an EFSS service.
Posted: 16 May 2016 | Published: 31 Dec 2014

Citrix

Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security

Big Data & Analytics For Dummies 2016
sponsored by Cisco Systems, Inc.
EBOOK: In this essential guide, you'll discover a detailed outline of the rapidly evolving fields of big data management and data science. Get the latest information on big data and analytics, and find out what it takes to succeed with this technology.
Posted: 09 Jun 2016 | Published: 09 Jun 2016

Cisco Systems, Inc.
76 - 100 of 827 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement