RSS feed Get our RSS feed

News by Topic

discovery

Results 276 - 300 of 318Sort Results By: Published Date | Title | Company Name
By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Smarsh     Published Date: Feb 27, 2014
More organizations are deploying and migrating their information archiving to the cloud. In this report, The Radicati Group provides an overall market evaluation of 10 leading Cloud archiving providers, tips for selecting an information archiving solution and the opportunities and challenges that compliance, IT and legal professionals experience when choosing an information archiving platform.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Smarsh     Published Date: Feb 27, 2014
Recent Microsoft® Exchange editions have basic archiving functionality, but highly regulated and publicly-held companies are likely to require more sophisticated third-party archiving solutions with advanced compliance, e-discovery and legal hold capabilities. Read this report to learn why content should be archived, what native archiving functionality in Exchange can (and cannot) do and recommendations for defining your archiving practices.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Special Counsel     Published Date: Sep 18, 2015
Our 2016 Salary Guide takes an in-depth look at salaries for traditional legal occupations, as well as the most sought-after positions in growing areas such as Information Governance and eDiscovery. Accurate national and local salary data combined with up-to-date job descriptions provide you with the knowledge you need to engage, hire and retain premier legal professionals.
Tags : legal industry, legal talent, recruitment, job market, salary data, retention, legal talent
     Special Counsel
By: Spectrum Enterprise     Published Date: Jun 05, 2017
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet customers’ time-critical information needs, Chief Operating Officer David Wilner, requires connectivity and data center solutions that can handle hundreds of terabytes of data—reliably and at top speeds. That’s why, by 2013, Wilner could no longer tolerate the reliability issues he was having with the company’s previous network provider. In search of a better partner, Wilner’s team chose Spectrum Enterprise. Unlike other providers who, Wilner felt, take little accountability for network reliability, he appreciated that— same as FRONTEO itself—Spectrum Enterprise offered a true end-to-end solution.
Tags : 
     Spectrum Enterprise
By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
     Spectrum Enterprise
By: Sponsored by HP and Intel®     Published Date: May 09, 2013
The cloud promises flexibility, agile development, rapid innovation, reductions in capital costs and infrastructure complexity, and much more. Before you can realize the cloud’s true potential, though, you need to clearly understand what you can do with it. That's why IT professionals from all industries and company sizes turn to an HP Cloud Discovery Workshop for help. Read this white paper for an overview of the HP Cloud Discovery Workshop and to understand how it can help clarify your company's cloud vision. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : cloud journey, cloud, flexibility, agile development, rapid innovation, capital costs
     Sponsored by HP and Intel®
By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
Read this white paper sponsored by HP and Intel® for an overview of the HP Cloud Discovery Workshop and to understand how it can help clarify your company's cloud vision -- through costs, potential and innovations.
Tags : adapt technology, cloud, organization of cloud, cloud infrastructure, it infrastructure, cloud implementation, intel
     Sponsored by HP and Intel®
By: Spredfast, Inc.     Published Date: Feb 05, 2015
Integrating social sponsorships can be more than a logo. In fact, they should be. When you add social experiences to your sponsorship packages, you’re bringing brand partners all-new ways to engage with audiences and gain valuable exposure. You’re also creating more inventory and new revenue streams for your owned properties. Welcome to the Next Level in Sponsorship outlines 3 basic steps for successfully integrating social into your packages. Up-to-the-minute examples from The NBA, Discovery.com, Toyota, JCPenney®, and other innovators in the sports and media worlds deliver fresh perspectives and creative inspiration. Pump up the value of your sponsorship packages with social. Download our quick-read whitepaper today.
Tags : spreadfast, sponsorship, inventory, revenue, social, advertiser, relationship, engage
     Spredfast, Inc.
By: Symantec     Published Date: Dec 19, 2012
We recommend this analyst report for anyone considering an investment in an archive solution.
Tags : information archiving, enterprise, magic quadrant, e-discovery, compliance, storage
     Symantec
By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
     Symantec
By: Symantec Corporation     Published Date: Jun 18, 2014
Compliance is a fast-moving target, and it’s getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards. Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information
     Symantec.cloud
By: Symantec.cloud     Published Date: Feb 03, 2010
Here are five common problems that occur when corporate employees use PST files and the advantages of email archiving.
Tags : messagelabs, symantec hosted services, pst file, personal storage table, email archiving, storage and backup, disaster recovery, compliance
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 28, 2011
This whitepaper discusses key considerations for conducting effective eDiscovery.
Tags : symantec.cloud, ediscovery, frcp, fre, edrm, imrm, data management, information management
     Symantec.cloud
By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
     Tenable
By: Tenable     Published Date: Aug 15, 2018
"What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale."
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
     Tenable
By: Teradata     Published Date: Jan 30, 2015
Data from the Internet of Things makes an integrated data strategy more vital than ever.
Tags : teradata, internet, things, iot, data, warehouse, analytics, patchwork
     Teradata
By: Teradata     Published Date: Feb 26, 2013
This report explores the evolution of big data analytics and its maturity within the enterprise. It discusses the approaches and economics to using a Discovery platform and Apache Hadoop within the same unified analytical architecture.
Tags : big data analytics, experiences with teradata, apache hadoop, analytics, discovery platform, apache hadoop, teradata
     Teradata
By: Teradata     Published Date: Jan 22, 2014
Today's agile businesses are seeking to expand analytics fast, gain flexible analytic deployment options and smooth cash flows. Download this paper to learn how Teradata understands these needs and has engineered a cloud solution that meets organizations' analytic needs.
Tags : cloud analytics, hadoop, analytics, cloud-based analytics, data warehousing, discovery capabilities, data management
     Teradata
By: Teradata     Published Date: May 02, 2017
Kylo overcomes common challenges of capturing and processing big data. It lets businesses easily configure and monitor data flows in and through the data lake so users have constant access to high-quality data. It also enhances data profiling while offering self-service and data wrangling capabilities.
Tags : cost reduction, data efficiency, data security, data integration, financial services, data discovery, data accessibility, data comprehension
     Teradata
By: TIBCO Software     Published Date: Aug 13, 2018
TIBCO Spotfire is the premier data discovery and analytics platform, which provides powerful capabilities for our customers, such as dimension-free data exploration through interactive visualizations, and data mashup to quickly combine disparate data to gain insights masked by data silos or aggregations.
Tags : 
     TIBCO Software
By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : advanced persistent, threat challenge, custom defense solution, trend micro, risk management
     Trend Micro
By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
     Trend Micro
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics