discovery management

Results 1 - 25 of 44Sort Results By: Published Date | Title | Company Name
By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
     123Together
By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content
     Astaro
By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : lenovo, xclarity, server value, system management, automated discovery, configuration management, software development, it management, enterprise applications
     Lenovo
By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : advanced persistent, threat challenge, custom defense solution, trend micro, risk management
     Trend Micro
By: Kaseya     Published Date: Mar 01, 2019
The increasing number of endpoints and the growing complexity of IT landscape brings in the need of having a unified method of managing IT. Unified Endpoint Management (UEM) gives organizations a simple, flexible way to manage and secure endpoints from an all-in-one single platform. With capabilities such as centralized discovery and management, automation and remote control, UEM equips enterprises to address complex problems encountered by IT in the current landscape. Download this ebook to learn how to enable your IT teams to eliminate roadblocks and increase productivity and move forward on their way to the digital transformation of the enterprise. Few salient points: -The challenges faced by modern IT teams -How Unified Endpoint Management helps address these challenges -Benefits of Unified Endpoint Management in the enterprise -Kaseya’s approach to UEM
Tags : 
     Kaseya
By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless, microsoft, windows, registry keys, windows registry, windows processes, windows services, agent, desktop management, windows registry, asset discovery, asset management, asset inventory
     Promisec
By: Kaseya     Published Date: Jan 14, 2013
Like 62% of your peers*, do you lack an easy way to discover and manage devices both on and off your network? One thing that won’t change in 2013 for IT Pros is the daily onslaught of challenges. Learn about 5 best practices for network discovery
Tags : kaseya, it automation, discovery & management, free webinar, increasing security, 5 best practices for network discovery, it management, data management
     Kaseya
By: Symantec.cloud     Published Date: Apr 28, 2011
This whitepaper discusses key considerations for conducting effective eDiscovery.
Tags : symantec.cloud, ediscovery, frcp, fre, edrm, imrm, data management, information management, content preservation, business content, electronic data content, litigation, esi
     Symantec.cloud
By: Entrust Datacard     Published Date: May 15, 2014
Certificate Discovery & Management Solution
Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.
Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
As various types of digital certificates are introduced to an organization, they become more difficult to track and manage — particularly if they’re issued from different certification authorities.
Tags : identity guard, cloud service, certificate discovery, management solution, security, data management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions.
Tags : ssl, digital certifications, discovery, management, solutions, ev multi-domain, security
     Entrust Datacard
By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence, security, it management, data management, data center
     McAfee
By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls
     McAfee
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance, security
     McAfee
By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning, configuration management
     Shavlik Technologies
By: Jive Software     Published Date: Feb 24, 2014
As of January 2011 there were 600 million Facebook users and 200 million Twitter users. Many millions use social services, from sharing photos via Instagram to sharing files via Box.net to via SlideShare. So how many of your employees use social media? A lot. That’s because social has become a normal tool used to manage and organize our lives. Social tools are flexible, efficient, effective and easy to adapt for personal and business uses.
Tags : jive, social media, workplace, workforce, compliance, ediscovery, human resources, workflow, social applicants, productivity, it management
     Jive Software
By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : code 42, legal process, ediscovery, litigation issues, enterprise applications
     Code42
By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper to learn 10 ways your company will save by moving your email management to the cloud.
Tags : mimecast, cloud-based email management, email archiving, software-as-a-service, e-discovery, continuity, policy management
     Mimecast
By: GFI Software     Published Date: Mar 21, 2011
Companies' dependency on email to do business brings with it various problems. Storage limitations, backups, problematic PST files, access to old emails and regulatory compliance or eDiscovery requests are a few issues that arise. Failure to address these effectively could have serious repercussions for the organization.
Tags : gfi, email archiving, backups, storage, pst files, regulatory compliance, ediscovery, exchange server, email management software
     GFI Software
By: Proofpoint     Published Date: Apr 22, 2010
Regulatory compliance, legal discovery and storage management issues are driving more organizations to consider email archiving. Here's what you should know when making decisions about your organization's use of email archiving technology.
Tags : proofpoint, email archiving, e-discovery, compliance, storage management, electronic discovery, search and retreival, knowledge management, server backups, data security
     Proofpoint
By: Teradata     Published Date: Jan 22, 2014
Today's agile businesses are seeking to expand analytics fast, gain flexible analytic deployment options and smooth cash flows. Download this paper to learn how Teradata understands these needs and has engineered a cloud solution that meets organizations' analytic needs.
Tags : cloud analytics, hadoop, analytics, cloud-based analytics, data warehousing, discovery capabilities, data management
     Teradata
By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : information-handling practices, edrm, electronic discovery, maturity model, it management, data management
     ARMA
By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
     Mimecast
By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
     Mimecast
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com