was successfully added to your cart.

Cart

Category

Information Governance

DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide Now Available

By | Buyer's Guides, Governance Risk and Compliance, Information Classification, Information Governance, Litigation Readiness, Security, SIEM, Threat Assessment | No Comments

DCIG is pleased to announce the availability of its DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide. In this Buyer’s Guide, DCIG weights, scores and ranks 29 SIEM appliances respectively from nine (9) different providers. Like all previous DCIG Buyer’s Guides, this Buyer’s Guide provides the critical information that all size organizations need when selecting a SIEM appliance to help provide visibility into their security posture by providing usable and actionable information.

Read More

ZL Technologies Brings Virtual Scale-out to Enterprise Archiving and eDiscovery

By | DCIG, Electronic Discovery, eMail Archive, Governance Risk and Compliance, Information Governance | No Comments

One of the most exciting and terrifying times in the lifecycle of a company is transitioning from a small to mid-range or mid-range to enterprise sized company. Well led companies that survive those transitions have often been planning for the occasion for some time. The longer they have been planning the more likely they’ve become aware of the need for long term archiving. Of everything.

Read More

2014 Mobile Data Management Buyer’s Guide Now Available

By | DCIG, Electronic Discovery, Encryption, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Key Management, Security, Threat Assessment | No Comments

DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.

Read More

Managing Data Deletion at a Granular Level; Executive Interview with C2C Systems CTO Part III

By | Data Management, Electronic Discovery, Information Governance, Litigation Readiness, Uncategorized | No Comments

Most companies recognize the benefits of deleting data when it no longer serves any business purpose or when it legal requirements to retain it have been met. However the act of deleting data still gives many organizations pause. In this third blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he discusses C2C’s policy management features and the granular ways in which users may manage deletion in their data stores.

Read More

Legal Precedents Put Computer Assisted eDiscovery on Course to Broader Enterprise Acceptance

By | DCIG, Early Case Assessment, Governance Risk and Compliance, Information Governance, Litigation Readiness, Search | No Comments

Faced with the accelerating increase in the volume of Electronically Stored Information (ESI) and the emergence of the concept of Big Data, enterprises worldwide need next generation IT systems to fulfill their corporate compliance, information governance and eDiscovery requirements to process and analyze all of this data. It is in response to this demand and the result of recent legal precendents that Technology Assisted Review (TAR), also known as Predictive Coding or Computer Assisted eDiscovery, is emerging as a legally viable and court-recognized option.

Read More

How to Wipe Company Data on Employees’ Mobile Devices while Leaving Personal Data Alone; Interview with GroupLogic, Part V

By | Cloud, DCIG, Governance Risk and Compliance, Information Governance, Information Management, SaaS | No Comments

In this final installment of our interview series with GroupLogic we look at how mobilEcho enables organizations to wipe only company data off employees’ mobile devices, leaving the employee’s personal data untouched. We also hear how GroupLogic is helping telecommunications firms increase revenue by adding value to their customers’ telecommunications experience, and we gain insight into the DNA of the company as a software provider for over 20 years.

Read More

GroupLogic explains Symantec and Commvault partnerships, ahead of acquisition by Acronis; Interview with GroupLogic, Part IV

By | Cloud, DCIG, Governance Risk and Compliance, Information Governance, Information Management, SaaS | No Comments

GroupLogic, a secure enterprise file sharing and syncing solutions provider, is all about responding quickly to customer demands for product features. On September 13th, Acronis announced it had acquired GroupLogic.
In our previous installment of this interview series, we examined how GroupLogic engages in “customer development” in lieu of product development to integrate customer-driven innovations into its products. In part 4, we take a look at GroupLogic’s strategic partnerships with other companies to create products that fulfill very specific needs for customers.

Read More

Customer-Driven Innovations in Enterprise File Share and Sync; Interview with GroupLogic, Part III

By | Cloud, DCIG, Information Governance, SaaS | No Comments

What happens when the market moves so fast that premeditated product development often can’t keep up? When extensive planning can lead to products that are out of date or irrelevant as soon as they are released? This is the dilemma GroupLogic faces in the enterprise file share and sync marketplace, where many companies have been building their own solutions–including customizing free and freemium solutions–to handle needs that out-of-the-box products simply don’t address.

Read More

Locking Down the Enterprise Cloud while Keeping It Simple and Easy to Use; Interview with GroupLogic, Part II

By | Application Delivery, DCIG, Governance Risk and Compliance, Information Governance, Information Management, SaaS, Security | No Comments

In part 2, we continue our discussion with GroupLogic’s Anders Lofgren, Vice President of Marketing and Product Management, by exploring licensing options and how the enterprise mobility space has opened up a new market for the company. As well, we dig deeper into activEcho and learn how it is designed to provide flexible and secure file-sync-and-sharing in the enterprise IT organization while being as simple and easy to use as one of the most popular–but unsecure–consumer grade file-sync-and-share cloud services today.

Read More

Five Initial Steps to Take to Meet the Governance, Risk and Compliance Obligations Brought on by Today’s Big Data File Stores

By | Big Data, DCIG, Governance Risk and Compliance, Information Governance, Information Management, Virtualization | No Comments

The accelerating increase in the amount of unstructured Electronically Stored Information (ESI) is leaving IT organizations struggling with how to store and manage all of this new information. Aside from needing to provide the underlying storage infrastructure to host this amount of data, companies are also faced with the task of properly managing their Big Data file stores to meet both existing and emerging governance, risk and compliance (GRC) obligations. To do so, there are five initial steps they can take now to get their organization in front of these demands.

Read More

LegalTech Recap: Big Data, ECA, Enterprise Dropbox and Cocktail Party

By | Archiving, DCIG, Electronic Discovery, Information Governance, Information Management | No Comments

DCIG attended LegalTech New York January 30th thru February 1st, 2012. The conference was well attended by legal professionals, consultants, and vendors. While meeting with them a few opportunities stood out as compelling: Mobile device handshake, Four Rules of Early Data Assessment, Enterprise Versions of box.com and dropbox.com, THE Best LegalTech Cocktail Party

Read More

Four Prerequisites for eDiscovery/Early Case Assessment Products

By | Application Delivery, DCIG, Early Case Assessment, Electronic Discovery, Information Governance, Legal Hold, Litigation Readiness, Search | No Comments

Companies who execute Information Governance plans are looking for eDiscovery products supporting Early Case Assessment (ECA). ECA is a combination of search, workflow management, information processing, and multilingual user interfaces. ECA requires a cohesive set of technology, business and data science stakeholders to select products.
ECA is powerful business process, but identifying ECA products is a beleaguering task. ECA mashes together eDiscovery and technology requirements. The “mashing of requirements” creates a broad matrix of products and functionality. Without question, eDiscovery has significantly evolved within the last few years.

Read More

Information Governance 2012: Data Science, not Storage and Security, is Required to Manage Big Data

By | @NOSQL, DCIG, Electronic Discovery, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Security, SRM | No Comments

Information managers can expect data storage companies to drive significant campaigns around Big Data as we enter 2012. Storage is the least of anyone’s concerns, according to The Economist Intelligence Unit (EIU) report Big Data: Harnessing a game-changing asset. Information Governance in 2012 requires Data Science strategy and practitioners be added to all business teams.

Read More

Big Data, Metadata, and Information Governance; CMIS Enables Scale, Tagging and Predictive Analytics

By | @NOSQL, DCIG, Electronic Discovery, Governance Risk and Compliance, Information Classification, Information Governance, Information Management | 2 Comments

Consumerization of content consumption models exposes opportunities to incorporate business process metadata with Big Data. Consumerization includes proliferation of social networks, content syndication and mobile devices, such as Apple iPAD, Samsung Tablet, etc. Consumerization of content merging with Enterprise Business Big Data is a challenge best met by standardized content interfaces.

Read More

Information Governance: The Proactive Approach

By | Archiving, DCIG, Disaster Recovery, Electronic Discovery, Information Governance, Information Management, Managed Service Provider | No Comments

You hear the words and phrases repeated in legal offices, data centers, break rooms, and boardrooms: liability, indemnity, retention, regulators, act of discovery, compliance. The discomforting sound of Information Governance contains echoes of cost, complexity, inconvenience, and potential penalties.

Read More

Don’t hit the button: Hoarders love deduplication and compression.

By | Data Management, DCIG, Deduplication, Electronic Discovery, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Litigation Readiness, Storage Systems, Tiered Data Systems | No Comments

Over the years big data has crept into the everyday life of systems administrators. Attempts to solve the big data problem in both block and file storage emerged as data management software. While data management software struggled to get a footing, deduplication and compression took off stunting data management software’s growth.
Deduplication and compression technologies have well known capabilities in both the storage and information disciplines. However, they differ in a significant way. These technologies do not ease the burden of information management.

Read More

The Coming New World of Healthcare Data Management Demands Healthcare Savvy Data Management Providers

By | Data Management, DCIG, Governance Risk and Compliance, Information Classification, Information Governance, Information Management | No Comments

Obama’s administration allocated $17B of the recent (Feb 09) stimulus spending package to healthcare, for the purpose of building better healthcare infrastructure. The goal of the new infrastructure is to move patient records online and enable a ubiquitous Electronic Health Record (EHR) to be shared universally among hospital systems. Obama himself promised a total of $50B in spending for this purpose during his campaign. Some experts believe that even more is to come. But, now that some of the money is allocated, how are healthcare institutions getting access to it and what are they doing with it?

Read More

No Rewards for Proactively Detecting Illegal Activity Using eDiscovery Software; But is Presuming Guilt the Next Logical Step?

By | DCIG, Electronic Discovery, eMail Archive, Information Governance, Information Management, Litigation Readiness | 4 Comments

A recent DCIG blog entry called into question the value of Bear Stearns selection of Orchestria and its inability to detect the alleged illegal activities of two of its Asset Management portfolio managers. More specifically, it asked why Orchestria did not detect the illegal activities of these individuals and why Bear Stearns did not configure it to monitor for these activities in the first place. The blog posting prompted a comment and phone call from Alan Morley, one of the individuals formerly responsible for implementing and managing Orchestria at Bear Stearns and why monitoring, detecting and preventing this activity is not as easy as it sounds.

Read More

Redact-It Brings Secure Black Outs to Electronically Stored Documents

By | Archiving, DCIG, Electronic Discovery, Governance Risk and Compliance, Information Governance, Information Management, Legal Hold, Litigation Readiness, Security | No Comments

Before storing documents electronically gained acceptance in the enterprise, retrieving documents meant parsing file cabinets and retrieving paper forms. And when it came time to share that information with the public without revealing classified information, it usually meant copying the original document and then pulling out a black marker that was used to cross out sensitive information on the copy, followed by more copying until the underlying text could no longer be seen. So while in the last decade most companies have scrapped file cabinets in favor of document images, more companies keep the black marker handy than they would probably like to admit.

Read More

FTC Issues Red Flag Rules Reminder; Ensuring IT is Ready as Unlimited Liability Looms on the Horizon

By | DCIG, Governance Risk and Compliance, Information Governance, Security, Threat Assessment | No Comments

The Federal Trade Commission (FTC) recently issued a reminder to financial companies of the upcoming November 1st 2008 deadline to be in compliance with the identity theft prevention program, and the pursuant FTC “Red Flag Rules.” If this is news to you, then you probably aren’t alone; but you should make yourself aware as your company might be subject to this regulation.

Read More
image_pdfimage_print
Bitnami