DCIG is pleased to announce the availability of its DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide. In this Buyer’s Guide, DCIG weights, scores and ranks 29 SIEM appliances respectively from nine (9) different providers. Like all previous DCIG Buyer’s Guides, this Buyer’s Guide provides the critical information that all size organizations need when selecting a SIEM appliance to help provide visibility into their security posture by providing usable and actionable information.
Category: Litigation Readiness
One of the most common initial use cases for cloud storage is for the storage of archival data. However that does not mean every organization is quite ready to move all of their archival data to the cloud or, what they do move to the cloud, trust the cloud to be available to provide access to the data when they need it. In this fifth blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he talks about the importance of having access to cloud storage repositories for archival data and the advantages of keeping on-premise and data in the cloud synchronized.
Most companies recognize the benefits of deleting data when it no longer serves any business purpose or when it legal requirements to retain it have been met. However the act of deleting data still gives many organizations pause. In this third blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he discusses C2C’s policy management features and the granular ways in which users may manage deletion in their data stores.
Predictive Analytics across the Enterprise: From eDiscovery to DoJ Second Requests to Proactive Protection of Intellectual Property
The accelerating increase in the volume of Electronically Stored Information (ESI) is resulting in knowledge workers reaching a point where they may not be able to utilize traditional data management and analytic technology and processes to keep pace. However, the increases in knowledge worker productivity and decreases in eDiscovery costs made possible by predictive analytic technology are coming to the point where they are applicable to other knowledge management tasks within the enterprise.
Faced with the accelerating increase in the volume of Electronically Stored Information (ESI) and the emergence of the concept of Big Data, enterprises worldwide need next generation IT systems to fulfill their corporate compliance, information governance and eDiscovery requirements to process and analyze all of this data. It is in response to this demand and the result of recent legal precendents that Technology Assisted Review (TAR), also known as Predictive Coding or Computer Assisted eDiscovery, is emerging as a legally viable and court-recognized option.
Companies who execute Information Governance plans are looking for eDiscovery products supporting Early Case Assessment (ECA). ECA is a combination of search, workflow management, information processing, and multilingual user interfaces. ECA requires a cohesive set of technology, business and data science stakeholders to select products.
ECA is powerful business process, but identifying ECA products is a beleaguering task. ECA mashes together eDiscovery and technology requirements. The “mashing of requirements” creates a broad matrix of products and functionality. Without question, eDiscovery has significantly evolved within the last few years.
On average most mid-sized companies are not bothering with Information Management as a means to mitigate e-discovery costs. That is a conclusion reached by comparing Symantec’s 2011 Information Retention and eDiscovery Survey announced in October 2011 with the research completed by King and Spalding, LLP for the Duke Law Journal December 2010.
Over the years big data has crept into the everyday life of systems administrators. Attempts to solve the big data problem in both block and file storage emerged as data management software. While data management software struggled to get a footing, deduplication and compression took off stunting data management software’s growth.
Deduplication and compression technologies have well known capabilities in both the storage and information disciplines. However, they differ in a significant way. These technologies do not ease the burden of information management.
Last week’s blog took a look at the 10 most read blogs in 2009 that were written in 2009. This week I wanted to step even further back and reflect upon the top 10 most read blogs in 2009 regardless of when they were written as I find this insightful in two ways. It lets me know what information continues to hold the attention of readers on as well as what topics from the past might become new trends in 2010. So while there is definitely some overlap between the two, there are also some entries that appear on this list that knock some of the top 10 blogs from last week off the list.
A recent virtual eDiscovery roundtable that I participated in highlighted the difficulties that companies are having in getting their arms around the proliferation of electronically stored information (ESI) in their organization. This is especially true when one considers the growth of social media and how it can negatively impact them going forward. One attorney participating in the roundtable even went so far to say that, “We have lost control in regards to blogs, wikis and newer forms of social media.” Thankfully the news is a little bit better in regards to the management of older, more mature forms of social media such as email but challenges still remain.