RSS feed Get our RSS feed

News by Topic

discovery

Results 251 - 275 of 319Sort Results By: Published Date | Title | Company Name
By: GFI Software     Published Date: Mar 21, 2011
Companies' dependency on email to do business brings with it various problems. Storage limitations, backups, problematic PST files, access to old emails and regulatory compliance or eDiscovery requests are a few issues that arise. Failure to address these effectively could have serious repercussions for the organization.
Tags : gfi, email archiving, backups, storage, pst files, regulatory compliance, ediscovery, exchange server
     GFI Software
By: Forensics Consulting Solutions     Published Date: Jan 31, 2011
A guide to understanding electronically stored information and workflows used to produce data for litigation.
Tags : e-discovery, esi, electronic discovery, electronically stored information, workflows, data governance
     Forensics Consulting Solutions
By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content
     Astaro
By: Discovery Corps, Inc     Published Date: Jan 11, 2011
Article on how to handle missing values in a dataset during a data mining project
Tags : data mining, missing values, techniques, diagnosis, tips, missing data
     Discovery Corps, Inc
By: DataFlux     Published Date: Jan 07, 2011
This white paper introduces and examines a breakthrough platform solution designed to drive parallel-process data integration - without intensive pre-configuration - and support full-lifecycle data management from discovery to retirement.
Tags : dataflux, enterprise data, data integration, configuration, lifecycle data management, data warehouses
     DataFlux
By: Shavlik Technologies     Published Date: Dec 15, 2010
Now you can have easy SaaS-based Discovery and Reporting on all Physical and Virtual Systems, Security Update Status and Assets in Minutes.
Tags : shavlik, cloud-based it management, saas, discovery and reporting, virtual systems, security update, netchk protect, virtual infrastructure
     Shavlik Technologies
By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning
     Shavlik Technologies
By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper for 12 steps that ensure good evidential quality of email.
Tags : mimecast, email quality, civil procedures rules, email system, e-discovery
     Mimecast
By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper to learn 10 ways your company will save by moving your email management to the cloud.
Tags : mimecast, cloud-based email management, email archiving, software-as-a-service, e-discovery, continuity, policy management
     Mimecast
By: Iron Mountain     Published Date: Sep 24, 2010
Increasingly firms are adopting data protection and recovery for enterprise laptops and desktops. Read this IDC Report to find out if your PCs and Laptops are Recovery and Discovery Ready.
Tags : iron mountain, cloud, pc backup, recovery, connected, data management, data storage, cloud storage
     Iron Mountain
By: BlackBerry     Published Date: Jul 23, 2010
Investing in mobility is like investing in any other important business activity, and its success will largely depend on how closely it is aligned with both business and IT drivers. A successful mobility plan should focus on 'mobilizing' your critical business processes and include planning phases for discovery, development and deployment. This Guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications.
Tags : blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, touchpoint
     BlackBerry
By: Savvis     Published Date: Jul 07, 2010
Savvis delivers a complex, fully managed infrastructure for Discovery to support its real-time advertising deliverables, ad sales, scheduling, and programming for all its international operations.
Tags : savvis, saas, deliverability, managed infrastructure, outsourcing
     Savvis
By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages
     Proofpoint
By: Proofpoint     Published Date: Apr 22, 2010
Regulatory compliance, legal discovery and storage management issues are driving more organizations to consider email archiving. Here's what you should know when making decisions about your organization's use of email archiving technology.
Tags : proofpoint, email archiving, e-discovery, compliance, storage management, electronic discovery, search and retreival, knowledge management
     Proofpoint
By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis
     Attivio
By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm
     ASG Software Solutions
By: Bloofusion     Published Date: Mar 01, 2010
Use the ten tough questions to quiz and help select your next SEO firm more effectively. Whether you are a CMO at billion dollar software firm or running your own online enterprise, at some point optimizing your site for discovery and favorable ranking by search engines for the terms that result in lead generation or purchase will become a priority.
Tags : bloofusion, ecommerce, url, ids, seo, cookie, optimization, tags
     Bloofusion
By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITILŪ) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab
     ASG Software Solutions
By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage
     Mimecast
By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information
     Symantec.cloud
By: Symantec.cloud     Published Date: Feb 03, 2010
Here are five common problems that occur when corporate employees use PST files and the advantages of email archiving.
Tags : messagelabs, symantec hosted services, pst file, personal storage table, email archiving, storage and backup, disaster recovery, compliance
     Symantec.cloud
By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
     Trend Micro SPN
By: Discovery Corps, Inc.     Published Date: Nov 20, 2009
Seeing into the hearts and minds of our customers is impossible; but this article describes how Data Mining techniques can be used to create strategies and tactics to increase customer retention and value.
Tags : data mining, business intelligence, predictive modeling, customer retention, high-value customers, decision support, clustering, discovery corps
     Discovery Corps, Inc.
By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules
     Iovation
By: Mimecast     Published Date: Aug 19, 2009
Businesses over the past ten years have used email archiving solutions in order to meet record retention compliance, facilitate electronic discovery, and control message-related storage costs. Despite these benefits, many organizations still have not adopted an archiving solution and still simply enforce mailbox quotas or message deletion policies as the best way to manage messaging environments.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage
     Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics