Risk Analysis and Legacy Data: How to make your Big Data Defensible

March 27, 2014

0

Every company and government organisation has defined goals, targets and strategies for their success or growth, with established timelines for each proposed deliverable. But along the way, all types of terrible events can take place which may jeopardize these strategies and prevent the achievement of these goals and targets. We cannot prevent or foresee all […]

Protecting your Intellectual Property

March 17, 2014

0

In today’s global economy the value of an enterprise’s Intellectual Property (IP) assets is very important. In many companies however, IP is not only stored in well protected or encrypted repositories, but also resides on personal computers, laptops, home computers, removable storage, in cloud locations such as BOX.net or in personal email boxes. This vast […]

Increasing Retention Periods require Open Archiving Standards

March 6, 2014

0

Due to the constantly increasing legal retention periods for electronic data, more and more government organizations and enterprises have to deal with old electronic archives from which the original manufacturer can be anything from being acquired to the absence of technical support for an older version of the archive. Once the technical lifecycle of this […]

Dealing with Documents in other Languages

January 28, 2014

0

High-stake investigations and eDiscovery projects are not limited by national boundaries and no investigator can afford to miss relevant information because it is in a foreign language and the cost of translation is too high. Multi-lingual text collection hide more complexities than it initially look like, because, in addition to differences in character sets and […]

Automatic Fraud Triangle Analytics made possible with Text-Mining and Content Analytics

January 21, 2014

0

Economic crimes such as corruption and fraud are difficult to detect and prevent, but the financial and reputational consequences and the growing public and political demand for harsh action on corporates whose employees break the law are forcing companies to review their security and compliance policies to limit the extent to which fraud can take […]

How Technology can Help Investigators to Discovery the Golden W’s

January 13, 2014

0

The answers to the “Five W’s” that every investigator knows from school form the basis of the complete story of an investigation: • Who is it about? • What happened? • When did it take place? • Where did it take place? • Why did it happen? Some investigators add a sixth and seven question, […]

How to Avoid Vendor-lockup in Email Archiving and Enterprise Information Archiving

January 7, 2014

0

By Mary Mack Recently, a new email-archiving challenge has arrived: as regulatory retention periods only get longer, many of these time frames are now longer than the average technical life of most commercial email archiving and enterprise information archiving solutions. As a result, one should incorporate at least one and in many case more conversions […]

Follow

Get every new post delivered to your Inbox.

Join 38 other followers