1,040 Results for:E-discovery and compliance

  • Sort by: 

IBM buys Ustream, launches cloud video service

By Katherine Finnell 29 Jan 2016

This week in UC news, IBM has acquired Ustream and added cloud-based video to its cloud service portfolio, while a survey found the hosted PBX market is steadily growing. Read More

As data threats and mandates persist, governance vital to manage risk

By Jeffrey Ritter 09 Jan 2015

Security threats and compliance rules complicate businesses' information protection efforts, but smart governance processes can help manage risk. Read More

Video: Records management tools and strategies expand in scope

25 Oct 2012

In this video, learn the potential bottom-line benefits of integrating records management tools and strategies with a broad set of business processes. Read More

Beyond BYOD: How new tech is driving digital information governance

By Ben Cole 18 Nov 2015

(This blog post was written by Diane K. Carlisle, executive director of content at ARMA International.) Day by day, effective information governance (IG) is made more urgent and more complicated by ... Read More

Business data management risks can't be solved just with SOA, cloud

By Steve Weissman 24 Nov 2015

SOA and the cloud are not the answers to everything. We examine the steps organizations need to take in order to solve problems surrounding business data retention. Read More

Voice recording compliance: What it is and how to achieve it

By Antony Adshead 18 Jun 2014

Voice recording compliance is subject to the regulation by the FSA, PCI, and Data Protection and Freedom of Information Acts Read More

Enterprise file sync-and-sharing vendors up close and in-depth

By Kevin Beaver 05 Jul 2017

Enterprise file sync and sharing helps users share, collaborate on and edit files to keep workflows moving. Learn what the various vendors can do for your mobile EFSS needs. Read More

Information security certification guide: Forensics

By Ed Tittel 30 Jan 2018

This information security certificate guide looks at vendor-neutral computer forensics certifications for IT professionals interested in cyber attribution and investigations. Read More

Use e-discovery software to secure social media technology

By John Weathington 13 Oct 2010

If your e-discovery software isn't sealing the cracks in your social media technology, our expert says there are only three things you can do: allow, avoid or accept. Read More

Cloud storage audit trail key to Geminare archiving service for MSPs

By Todd Erickson 27 Jul 2010

Geminare launches Cloud Storage Assurance (CSA) 2.0, its archiving and indexing service that it sells through MSPs, VARs, and SaaS providers. The CSA platform provides an auditable trail for data stored in public ... Read More