The Nemertes Research Group Inc., Nov 2008, Pages: 8
Organizations today are drowning in electronic information and one of the greatest challenges is e-retention: which information to keep and for how long. Unfortunately, there are few ground rules for e-retention, resulting in a broad spectrum of ways that organizations deal with the issue. Of all the factors that influence e-retention one of the strongest is the need to produce information during a legal action; driven by the Federal Rules of Civil Procedure (FRCP).This issue paper discusses FRCP, the relevant rules for e-discovery and proposes that following information stewardship best provides a good baseline for establishment of both e-discovery and e-retention policies and procedures.
ReedLogic, July 2009, Minutes: 60
What Litigators Need to Know About the Impact of Social Media on E-Discovery Practices is a time efficient way to understand the impact of sites such as Facebook, Twitter, YouTube and others on your e-discovery practices. Take the 60-minutes to view this Instant Impact seminar to understand the best ways to go about doing e-discovery on each of the major social media sites, specific do's and don'ts, and case studies of the impact of such sites on specific cases.
Enterprise Management Associates, Jan 2007, Pages: 64
Enterprise Content Management (ECM) is a rapidly evolving field that enables a business to create, acquire, store, index, deliver, and delete this wide variety of content. It is a critical part of IT, providing the ability for business to access structured information, meet legal and compliance requirements, and serve customers. This study provides some of the most extensive research to date, based on customer surveys and interviews, covering content use patterns, business drivers, expectations, preferred vendors, distribution requirements, and more.
Frost & Sullivan, Dec 2008
This research analyzes the global enterprise content management (ECM) market. Frost & Sullivan defines ECM as an enterprise-wide solution in the digital media value chain where content is created, ingested and stored, managed, retrieved, rerendered, repurposed, shared and distributed in a controlled, highly collaborative, secure and user-friendly software solution. This study analyzes the state of the industry today, factors that will drive or restrain market growth in the future, market demand and revenue forecasts, and growth projections for individual vendors and the industry at large.
Datamonitor, May 2008, Pages: 26
This report provides an in-depth look into the opportunities that the identity and access management market represents to both vendors and end-users. It also explores likely scenarios in the evolution of the market, both in terms of technology and market dynamics. In addition, this report provides vendors with actionable recommendations that can assist them with their go-to-market strategy.
Datamonitor, Dec 2008, Pages: 40
Introduction
As the focus of enterprise security moves from the perimeter and towards identity-centric and information-centric security, ID&AM will become a strategic issue in a wide variety of settings. Datamonitor has developed this Decision Matrix to help businesses select the most appropriate ID&AM vendors based on their technology strength, reputation among customers, and impact in the market.
Janco Associates, Inc, May 2009, Pages: 200
This Disaster Recovery Plan (DRP) can be used as a Disaster Planning template for any size of enterprise. The Disaster Recovery template and supporting material have been updated to be Sarbanes-Oxley and HIPAA compliant. The Disaster Planning Template comes as both a Word document and a static fully indexed PDF document and includes:
Frost & Sullivan, Feb 2007, Pages: 51
This Frost & Sullivan research titled North American Business Continuity and Disaster Recovery Markets focuses on end-user demand for business continuity and disaster recovery services and provides enterprise-spending outlook for the North American market. This study also examines the various trends with regard to the implementation of business continuity services within the small, medium, and large enterprise markets.
ICON Group International, Sep 2008, Pages: 211
WHAT IS LATENT DEMAND AND THE P.I.E.?
The concept of latent demand is rather subtle. The term latent typically refers to something that is dormant, not observable or not yet realized. Demand is the notion of an economic quantity that a target population or market requires under different assumptions of price, quality, and distribution, among other factors. Latent demand, therefore, is commonly defined by economists as the industry earnings of a market when that market becomes accessible and attractive to serve by competing firms.
American Productivity & Quality Center (APQC), April 2009, Pages: 118
Description: The organizations selected for deep, detailed study through structured data collection and site visits (referred to throughout the report as "best-practice organizations" or "study partners") demonstrate innovative performance in one or more of the following study focus areas:
Datamonitor, Nov 2008, Pages: 33
Description
A successful operational risk management (ORM) strategy can help organizations meet the challenges posed by emerging technologies by providing a framework for managers to consider how risk exposures are changing, determine the amount of risk they are willing to accept and ensure they have the appropriate risk mitigants in place to limit risk to targeted levels.
Enterprise Management Associates, Aug 2007, Pages: 50
In recent years, the number and range risks facing IT have exploded. From business malfeasance and insider risks, to new and more malicious classes of security attacks, enterprises are challenged as never before to contain threats to critical information resources. The introduction of numerous regulatory and industry compliance measures have raised the challenge to the level of mandate: businesses must adopt a more consistent and comprehensive approach to IT governance. In each of these demands, a consistent theme is heard with increasing urgency: the enterprise must take a more strategic approach to IT risk management.
Enterprise Management Associates, May 2008, Pages: 61
Description
In recent months, IT GRC has emerged as a unifying theme aligning the management of IT, IT risk and regulatory compliance with the priorities of the business. But what does IT GRC mean in a practical sense, to the IT organization charged with its success? In a survey of more than 200 professionals in both IT and non-IT fields complemented by focus interviews with real world practitioners, this study identifies the processes, practices and technologies most highly valued by high performers in IT GRC management.
John Wiley and Sons Ltd, May 2008, Pages: 342
Description
Governance, risk, and compliance-these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole enterprise stronger.