Guidance Software

Displaying 1-5 of 5 results

  • White Papers // Dec 2010

    The e-Discovery Toolbox: What You Should Look for in a Unified e-Discovery Solution

    Faced with the high costs of outsourcing e-discovery to vendors, consultants and outside counsel, organizations have no doubt considered in sourcing some of the work. The decision of which e-discovery processes to bring in-house is based on various considerations. Setting aside the document review phase of the process, organizations look...

    Provided By Guidance Software

  • White Papers // Apr 2009

    Ensuring FISMA Compliance: Integrating Forensics and Incident Response as Mandated by NIST SP 800-86

    The Federal Information Security Management Act (FISMA) of 2002 mandates that federal agencies must establish incident response capabilities (44 U.S.C. ?3544 (b)(7)). FISMA requires that federal agencies implement an incident response capability consistent with the guidelines and standards established by the National Institute of Standards and Technology (NIST) (44 U.S.C....

    Provided By Guidance Software

  • White Papers // Apr 2009

    Cyber Solutions Center PII Bulletin

    Personally-Identifiable Information (PII) is information that can be used to trace an individual's identity, such as a name, social security number, or biometric record. According to a May 22., 2007 memo from the Office of Management and Budget (OMB) to the heads of executive departments and agencies, "Safeguarding PII in...

    Provided By Guidance Software

  • White Papers // Nov 2008

    Tackling the Causes of Data Leakage and Data Loss

    Everyone lives in a data-driven, information-centric economy that brings with it great opportunities for companies and customers. Organisations can manage customer relationships and target their services and products more effectively to meet customers' needs. In turn, customers enjoy a closer and more influential relationship with their suppliers. But with privilege...

    Provided By Guidance Software

  • White Papers // Aug 2008

    The Presumption of Good Faith: Defending Your eRecords Retention Policies With Active Enforcement

    The purging and preservation of ESI is a technical process that requires a technical solution, especially if a company hopes to establish such capabilities on a global, integrated and routine basis. Enterprise computer collection and auditing technology is required in order to apply eRecords management and eDiscovery processes in a...

    Provided By Guidance Software

  • White Papers // Aug 2008

    The Presumption of Good Faith: Defending Your eRecords Retention Policies With Active Enforcement

    The purging and preservation of ESI is a technical process that requires a technical solution, especially if a company hopes to establish such capabilities on a global, integrated and routine basis. Enterprise computer collection and auditing technology is required in order to apply eRecords management and eDiscovery processes in a...

    Provided By Guidance Software

  • White Papers // Nov 2008

    Tackling the Causes of Data Leakage and Data Loss

    Everyone lives in a data-driven, information-centric economy that brings with it great opportunities for companies and customers. Organisations can manage customer relationships and target their services and products more effectively to meet customers' needs. In turn, customers enjoy a closer and more influential relationship with their suppliers. But with privilege...

    Provided By Guidance Software

  • White Papers // Dec 2010

    The e-Discovery Toolbox: What You Should Look for in a Unified e-Discovery Solution

    Faced with the high costs of outsourcing e-discovery to vendors, consultants and outside counsel, organizations have no doubt considered in sourcing some of the work. The decision of which e-discovery processes to bring in-house is based on various considerations. Setting aside the document review phase of the process, organizations look...

    Provided By Guidance Software

  • White Papers // Apr 2009

    Ensuring FISMA Compliance: Integrating Forensics and Incident Response as Mandated by NIST SP 800-86

    The Federal Information Security Management Act (FISMA) of 2002 mandates that federal agencies must establish incident response capabilities (44 U.S.C. ?3544 (b)(7)). FISMA requires that federal agencies implement an incident response capability consistent with the guidelines and standards established by the National Institute of Standards and Technology (NIST) (44 U.S.C....

    Provided By Guidance Software

  • White Papers // Apr 2009

    Cyber Solutions Center PII Bulletin

    Personally-Identifiable Information (PII) is information that can be used to trace an individual's identity, such as a name, social security number, or biometric record. According to a May 22., 2007 memo from the Office of Management and Budget (OMB) to the heads of executive departments and agencies, "Safeguarding PII in...

    Provided By Guidance Software