1,040 Results for:E-discovery and compliance

  • Sort by: 

Buying guide: Enterprise cloud storage from top consumer providers

By Robert Sheldon 09 Sep 2014

Consumer and enterprise cloud storage options abound, but how do you pick the one that's right for your company? Start by getting the facts on the four major players: Dropbox, Google Drive, Microsoft OneDrive and ... Read More

New global BIA standard worth a look

By Paul Kirvan 07 Aug 2015

ISO 22317, a new global standard for conducting a business impact analysis, is worth a look if you are preparing to perform a BIA or updating a current BIA. Read More

Five tips to steer mobile information governance and security

By Francesca Sales 17 Jun 2014

When data is your most valued asset, BYOD and risk go hand in hand. These five tips can help steer your mobile information governance strategy. Read More

New mobile data access points complicate data protection strategies

By Emily McLaughlin 25 Feb 2014

In a world gone mobile, new devices inherently create new data access points and muddle IT's information governance and data protection strategies. Read More

Enlightened shadow IT policy collaborates with users

By Sandra Gittlen 04 May 2017

A cloud-era shadow IT policy still needs to manage risk, but the era of "no way" is giving way to allow users quick access to the productivity apps they need. Read More

Copy data management vendors expand breadth of offerings

By Chris Evans 18 Aug 2017

This roundup of copy management systems from the leading vendors shows the distinct categories and implementation models this cost-saving technology can provide. Read More

Backup vs archive: Can they be merged?

By Manek Dubash 28 May 2014

As backup software suppliers build more archiving features into their products, we look at whether it’s possible to merge backup and archive systems Read More

Barracuda storage grows with new platforms, archiving acquisition

By Garry Kranz 15 Sep 2014

Data Protection Plus integrates Barracuda storage devices with tools to improve file sharing and information management. Read More

Bring-your-own-device (BYOD) and legal/regulatory compliance

29 Nov 2011

Bring-your-own-device seems to be an irresistible tide, as employees connect endpoints to the network. So, what can you do to mitigate threats to compliance? Read More

Cloud service brokers: Exploring information security pros and cons

By Ed Moyle 18 Jun 2014

Cloud service brokers can simplify management and reduce costs, but do they hinder security? Learn the cloud broker benefits and challenges. Read More