1,039 Results for:E-discovery and compliance

  • Sort by: 

GDPR breach notification: Time to focus on the requirements

By Steve Zurier 01 Feb 2018

Some large U.S. companies have been working behind the scenes on GDPR requirements for more than a year, but there's strong evidence that many have not been as diligent. Read More

Mojo AirTight WIPS overview

By Karen Scarfone 29 Jul 2016

Expert Karen Scarfone looks at the features and functionality of Mojo Networks' AirTight WIPS, a wireless intrusion prevention system designed to detect and block WLAN attacks. Read More

Microsoft E5 plan supports new ATP, Skype functionality

By Steve Goodman 13 Jan 2016

Microsoft's new Office 365 E5 plan offers features applicable across the organization. But some of the new functionality isn't useful to all, and some features bring controversy. Read More

Inside the Informatica Master Data Management portfolio

By Sue Hildreth 17 Oct 2016

Informatica Master Data Management is aimed at helping sales, marketing and customer service teams ensure they're working from the most relevant and accurate data available. Read More

Barracuda Networks going private

By Sonia Lelii 30 Nov 2017

Barracuda Networks became the latest public technology vendor to go private when equity firm Thoma Bravo agreed to pay $1.6 billion this week to acquire the security and data protection vendor. The ... Read More

Better team messaging app security could boost enterprise adoption

By Zeus Kerravala 23 Aug 2017

Enhanced team messaging app security, compliance and analytics could kindle adoption across enterprises. As an example, Cisco Spark just unveiled several updates. Read More

Data storage management tools: 2017 Products of the Year finalists

By Rodney Brown 15 Jan 2018

Storage management tools candidates for this year's Products of the Year competition reflect the growing importance of the cloud and machine learning. Read More

Personal email servers: What are the security risks?

By Michael Cobb 06 Apr 2016

Hillary Clinton has taken much criticism over the use of a personal email server. Expert Michael Cobb explains the risks of shadow IT email and what enterprises can do about them. Read More

Build an application migration plan step by step

By Paul Korzeniowski 11 Dec 2017

To migrate apps to the cloud, start with nonessential workloads and move to more mission-critical ones from there. But, remember, some apps might not be suited for cloud at all. Read More

ASEAN’s growing appetite for unified communications

By Aaron Tan 27 Mar 2018

Led by enterprises in Singapore and Malaysia, adoption of unified communications tools is expected to grow with the surge in demand for cloud-based and hosted offerings Read More