HIT Consultant Insightful coverage of healthcare innovation
 

it discovery

Results 76 - 100 of 210Sort Results By: Published Date | Title | Company Name
Published By: Kaseya     Published Date: Jan 14, 2013
Like 62% of your peers*, do you lack an easy way to discover and manage devices both on and off your network? One thing that wonít change in 2013 for IT Pros is the daily onslaught of challenges. Learn about 5 best practices for network discovery
Tags : 
kaseya, it automation, discovery & management, free webinar, increasing security, 5 best practices for network discovery
    
Kaseya
Published By: Rand Secure Archive     Published Date: Jun 06, 2013
Without a doubt, technology has revolutionized the way business is done. The vast majority of internal and external communication is now done through email, instant messaging, VOIP and other types of electronic communication. In addition, most business documents exist in digital form. The digitization of business has had significant implications for litigation. Legal eDiscovery is now an essential part of settling cases between organizations. Previously, many companies believed that eDiscovery was only for organizations that were public or highly regulated, but now most companies recognize that electronically stored information (ESI) regulations are applicable to all organizations and there is an ever-increasing need for cost-effective eDiscovery.
Tags : 
coding, ediscovery, legal, effective, organization
    
Rand Secure Archive
Published By: Mimecast     Published Date: Apr 18, 2017
"Your organization canít survive without email. In turn, the data held within email is an invaluable resource for compliance, e-discovery and workflow efficiency purposes. And moving to the cloud involves its own set of challenges around preserving that content. Itís time to rethink archiving. Download our E-book, 5 Essentials for Cloud Archiving Success, to learn: - How to avoid common misconceptions about cloud email archiving - Ways to enable employee efficiency and productivity through archiving - Why every organization must be prepared for e-discovery and litigation "
Tags : 
cloud, cloud archiving, email archiving, litigation
    
Mimecast
Published By: Symantec.cloud     Published Date: Apr 28, 2011
This whitepaper discusses key considerations for conducting effective eDiscovery.
Tags : 
symantec.cloud, ediscovery, frcp, fre, edrm, imrm, data management, information management, content preservation, business content, electronic data content, litigation, esi
    
Symantec.cloud
Published By: LifeSize, a division of Logitech     Published Date: Aug 03, 2011
With any newer technology, there are plenty of misconceptions and concerns about HD video communications. To aid your research and discovery process, we've outlined the five myths we receive most often.
Tags : 
video conference, video conferencing, videoconference, videoconferencing, hd video conferencing, high definition video, high definition videoconferencing, video communications
    
LifeSize, a division of Logitech
Published By: Pentaho     Published Date: Apr 28, 2016
Today, the need for self-service data discovery is making data governance a charged topic. As business-driven data discovery emerges as a fundamental need, the ability to ensure that data and analytics are trustworthy and protected becomes both more difficult and more imperative. This research explains how to manage the barriers and risks of self-service and enable agile data discovery across the organization by extending existing data governance framework concepts to the data-driven and discovery-oriented business. Youíll learn: - The implications of the "freedom vs. control" paradox - How to design for iterative, "frictionless" discovery - Critical checkpoints in data discovery process where governance should be in place
Tags : 
pentaho, governed data, data and analytics, governance framework, freedom vs control, frictionless discovery
    
Pentaho
Published By: Riverbed     Published Date: May 18, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs and your ability to provide governance will determine the success level of your entire enterprise. With complexity growing at such a hyperbolic rate, in the future, automated application discovery and dependency mapping will not just be useful -it will be mandatory.
Tags : 
service management, management software, infrastructure, devops, cloud performance monitoring, application monitoring, database monitoring, end user experience monitoring, transaction monitoring
    
Riverbed
Published By: Actiance     Published Date: Jul 09, 2012
SharePoint is used for a variety of information management tasks, the majority of which are subject to regulatory, e-Discovery, and legal mandates, as well as existing corporate policies.
Tags : 
sharepoint, double positive, microsoft
    
Actiance
Published By: Teradata     Published Date: Feb 26, 2013
This report explores the evolution of big data analytics and its maturity within the enterprise. It discusses the approaches and economics to using a Discovery platform and Apache Hadoop within the same unified analytical architecture.
Tags : 
big data analytics, experiences with teradata, apache hadoop, analytics, discovery platform, apache hadoop, teradata
    
Teradata
Published By: C2C Systems     Published Date: Apr 24, 2013
Download this white paper to see how PST Enterprise enables corporate IT to regain control of distributed corporate email found in PST files to manage compliance, support discovery and minimize risk associated with this data. It enables full discovery of all PST files, regardless of their location or status, and it provides the information needed to take intelligent action on the data within. Such actions include owner determination, in-place retention, data migration, and file copy, move, disconnect and deletion.
Tags : 
pst enterprise, files, emails, data migration, file copy, distribution
    
C2C Systems
Published By: Riverbed     Published Date: Feb 15, 2018
To stay ahead in today's hybrid network, you need a lens into the end user's experience as well as an understanding of the dependencies between your applications and network. With this approach, you are alerted to issues before the business is impacted and problems are resolved faster. This eBook details what you need to know to select a best of breed network performance management solution and outlines the critical capabilities required for deep application visibility across virtualized, hybrid and cloud networks no matter where a user is located. Read this book and: Discover best practices - for proactive network monitoring and fast troubleshooting Learn how to stay ahead of application performance issues with increased visibility Increase productivity and a higher ROI - with automatic discovery, end-to-end monitoring, reporting, analytics and faster MTTR Ensure your approach is a proactive mode Study the evaluation checklist - select the best solution for your needs
Tags : 
    
Riverbed
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If youíre not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Entrust Datacard     Published Date: May 15, 2014
Certificate Discovery & Management Solution
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Certificate Services provide one of the industryís most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
As various types of digital certificates are introduced to an organization, they become more difficult to track and manage ó particularly if theyíre issued from different certification authorities.
Tags : 
identity guard, cloud service, certificate discovery, management solution
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust Certificate Services provide one of the industryís most comprehensive offerings of digital certificates and related services, tools and solutions.
Tags : 
ssl, digital certifications, discovery, management, solutions, ev multi-domain
    
Entrust Datacard
Published By: Riverbed     Published Date: Oct 17, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs. With complexity growing at a fast rate, application discovery and mapping will soon be mandatory.
Tags : 
riverbed, application visibility, infrastructure monitoring, it infrastructure
    
Riverbed
Published By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : 
mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence
    
McAfee
Published By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP ó This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : 
dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls
    
McAfee
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Compliance is a fast-moving target, and itís getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards. Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: hightail     Published Date: Jan 17, 2014
Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.
Tags : 
    
hightail
Published By: Microsoft Surface     Published Date: Jun 30, 2017
The Natural Progression of the Digital Experience Our notes are the gatekeepers to discovery. From alternating current to the lithium battery, the flick of a pen is often the first stage of every great idea, but how many other great discoveries and connections have we missed, simply because we didnít write something down?
Tags : 
    
Microsoft Surface
Published By: Microsoft Surface     Published Date: Jun 30, 2017
The Natural Profession of the Digital Experience Our notes are the gatekeepers to discovery. From alternating current to the lithium battery, the flick of a pen is often the first stage of every great idea, but how many other great discoveries and connections have we missed, simply because we didnít write something down?
Tags : 
    
Microsoft Surface
Published By: Dell Software     Published Date: Apr 25, 2008
In Quest’s new white paper, learn how to implement a solid data protection, recovery, compliance and e-discovery strategy for your critical e-mail data.
Tags : 
disaster recovery, data protection, exchange recovery, exchange e-discovery, comprehensive data protection, continuous data protection, brick level recovery, email archiving, quest, quest software
    
Dell Software
Published By: Oce Business Services     Published Date: Mar 24, 2008
A new survey of legal professionals reveals that 90% of in-house counsel believes their companies are largely unprepared for legal discovery.  Get full survey results and best-practice recommendations to uncover where potential gaps exist. Identify the biggest opportunities to proactively prepare for discovery requests and improve outcomes by utilizing an outsourcing strategy.
Tags : 
ediscovery, law, oce
    
Oce Business Services
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.