HIT Consultant Insightful coverage of healthcare innovation
 

it discovery

Results 76 - 100 of 215Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : 
mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper for 12 steps that ensure good evidential quality of email.
Tags : 
mimecast, email quality, civil procedures rules, email system, e-discovery
    
Mimecast
Published By: Accelops     Published Date: Nov 05, 2012
Read this white paper to learn how the combination of discovery, data aggregation, correlation, out-of-the-box analytics, data management, and reporting can yield a single pane of glass into data center and IT operations and services.
Tags : 
accelops, data center, cloud service, cloud service management
    
Accelops
Published By: Pentaho     Published Date: Apr 28, 2016
Today, the need for self-service data discovery is making data governance a charged topic. As business-driven data discovery emerges as a fundamental need, the ability to ensure that data and analytics are trustworthy and protected becomes both more difficult and more imperative. This research explains how to manage the barriers and risks of self-service and enable agile data discovery across the organization by extending existing data governance framework concepts to the data-driven and discovery-oriented business. You’ll learn: - The implications of the "freedom vs. control" paradox - How to design for iterative, "frictionless" discovery - Critical checkpoints in data discovery process where governance should be in place
Tags : 
pentaho, governed data, data and analytics, governance framework, freedom vs control, frictionless discovery
    
Pentaho
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions.
Tags : 
ssl, digital certifications, discovery, management, solutions, ev multi-domain
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Certificate Discovery & Management Solution
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
As various types of digital certificates are introduced to an organization, they become more difficult to track and manage — particularly if they’re issued from different certification authorities.
Tags : 
identity guard, cloud service, certificate discovery, management solution
    
Entrust Datacard
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Teradata     Published Date: Feb 26, 2013
This report explores the evolution of big data analytics and its maturity within the enterprise. It discusses the approaches and economics to using a Discovery platform and Apache Hadoop within the same unified analytical architecture.
Tags : 
big data analytics, experiences with teradata, apache hadoop, analytics, discovery platform, apache hadoop, teradata
    
Teradata
Published By: Dell Software     Published Date: Apr 25, 2008
In Quest’s new white paper, learn how to implement a solid data protection, recovery, compliance and e-discovery strategy for your critical e-mail data.
Tags : 
disaster recovery, data protection, exchange recovery, exchange e-discovery, comprehensive data protection, continuous data protection, brick level recovery, email archiving, quest, quest software
    
Dell Software
Published By: Sponsored by HP and Intel®     Published Date: May 09, 2013
The cloud promises flexibility, agile development, rapid innovation, reductions in capital costs and infrastructure complexity, and much more. Before you can realize the cloud’s true potential, though, you need to clearly understand what you can do with it. That's why IT professionals from all industries and company sizes turn to an HP Cloud Discovery Workshop for help. Read this white paper for an overview of the HP Cloud Discovery Workshop and to understand how it can help clarify your company's cloud vision. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
cloud journey, cloud, flexibility, agile development, rapid innovation, capital costs
    
Sponsored by HP and Intel®
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Uncover and block unsanctioned apps across your enterprise with App Discovery and blocking by Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: Feb 24, 2015
This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.
Tags : 
ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions
    
IBM
Published By: Infoblox     Published Date: Nov 07, 2013
Network management is becoming increasingly difficult, costly and time-consuming. Legacy manual procedures cannot keep up with today’s complex networks. Read this white paper to learn why implementing network automation is critical to managing your network
Tags : 
infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri, spm, acm, switch_port_manager, automation_change_manager, change_and_configuration, compliance_manager, network_compliance, network_complexity, multi-vendor_network, network_change_configuration, network_discovery
    
Infoblox
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Riverbed     Published Date: May 18, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs and your ability to provide governance will determine the success level of your entire enterprise. With complexity growing at such a hyperbolic rate, in the future, automated application discovery and dependency mapping will not just be useful -it will be mandatory.
Tags : 
service management, management software, infrastructure, devops, cloud performance monitoring, application monitoring, database monitoring, end user experience monitoring, transaction monitoring
    
Riverbed
Published By: Mimecast     Published Date: Oct 02, 2019
Forrester Research provides insights into the key trends that are impacting your business today. The Information Archiving Now Tech report is an invaluable tool for anyone actively considering or comparing Information Archiving solutions. No matter where you sit in your organization, this is a must-read to help you build a modern, secure archive that’s purpose built for e-discovery, compliance and end-user productivity. With a credible, side-by-side comparison of leading products, you can make a more informed investment that best fits the diverse needs of your business.
Tags : 
    
Mimecast
Published By: IBM     Published Date: Oct 22, 2014
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : 
data classification, data discovery, defining data, data identity
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : 
ibm, data discovery, data classification, big data, risk mitigation
    
IBM
Published By: IBM     Published Date: Apr 06, 2015
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : 
data discovery, data classification, security, risk, ibm
    
IBM
Published By: IBM     Published Date: Jul 08, 2016
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization’s risk and enhancing security.
Tags : 
ibm, forrester, data discovery, big data, data, analytics, information governance
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.