Top Ten Tips for Managing e-discovery Vendors

Size: px
Start display at page:

Download "Top Ten Tips for Managing e-discovery Vendors"

Transcription

1 Top Ten Tips for Managing e-discovery Vendors Apr 03, 2013 Top Ten By Daniel B. Garrie This resource is sponsored by: By Daniel B. Garrie, Senior Managing Partner, Law & Forensics LLC, Thomson Reuters The transformation of discovery into e-discovery has wreaked havoc on the practice and business of law, creating more money for vendors at large and for some lawyers irrespective of the economy. It is virtually impossible to have litigation without some amount of e-discovery. From the s sent between employees around LIBOR, to digital footprints left by high-tech criminals in the New York Times breach, to employees involved in contentious divorce proceedings, the digital world is involved. This has led to a third party in the relationship between lawyers and litigants the e-discovery vendor. Today, e-discovery can be fully outsourced or done entirely internally, or some place in between. Irrespective of where you fall in the spectrum, at some point your corporation will undoubtedly involve one or more e-discovery software and/or vendors. This article provides ten tips for counsel to consider when evaluating e-discovery software or services. Of course, these are broad and general tips and require tweaking to be effective within your company. 1. Weigh the legal risks and your company culture to see if bringing an e-discovery solution in-house, or just a component of the solution, is a good idea. One of the most common reasons a company fails to deploy an e-discovery solution is the company culture. Some legal departments are structured such that the idea of being responsible for managing discovery is simply not part of the job description. Other companies struggle to get outside counsel on-board and acquiesce to using the solution their outside firm uses, and while this is happening less and less, it s still happening. Other times the system is purchased, but the champion of the tool leaves the legal department and the eight figure system simply dies on the vine. It is critical before looking at e-discovery solutions that counsel is aware of the corporate culture within which they are operating. For example, I have advised several global companies to utilize a managed service approach to e-discovery because the company culture lent itself better to utilizing vendors. By outsourcing a large portion of their IT functions it made delivery of any e-discovery solution a great deal more complex.

2 2. Try before you buy. Companies should follow the try before you buy principle, meaning they should test the e-discovery solution using an old case, not a case provided by a vendor. The vendor is never going to provide a case that is not going to work, because if it fails you will not buy the solution. In-line with this concept, counsel should encourage as many people in the legal department to test the new software before it is purchased. Ideally, counsel should bring in the end users of the software, or the team members who will work directly with outside vendors to make sure they have input in the review and selection process. Often these end users have a better idea of how the solution will be utilized and will most likely have a wish list of improvements for future software purchases. 3. Verify that the e-discovery solution you are buying is being used by the person selling it. You should never purchase an e-discovery solution from a vendor whose own legal team does not use the product. In addition, do not hesitate to ask around and see what other companies are using for their in-house software and outside vendor services. It is rare that an e-discovery solution provider will provide you with a bad reference. Thus, I strongly suggest that you reach out thru your network and ask to speak with people who have bought and used the system as they often will be able to deliver an unvarnished view. When you reach out to them, it is useful to consider asking questions that include: how easy or hard the e-discovery solution was to install, how much work is required to manage the e-discovery solution, and what would they do differently if they were starting from scratch. In addition, you should also ask about the skill level of the vendor, customer service, and overall abilities of an e-discovery solution or outside e-discovery service provider. I recommend having the conversation face-to-face. It is certainly a conversation that can save counsel a great deal of money, time, and headache. 4. Perform a cost benefit analysis of your existing e-discovery vendor services. Before buying an e-discovery solution or using an e-discovery vendor anything, it is important to understand the cost-benefit dynamic. high cost + low benefit = do not purchase low cost + high benefit = purchase solution high cost + high benefit = depends low cost + low benefit = depends Today, counsel often assumes that bringing a solution in-house will deliver value and lower costs, but it is critical that counsel validate this assumption before acting. Counsel should know the answers to these questions: How much money do you currently spend with outside vendors on each case in identifying, collecting, or preserving data? How much do you spend on e-discovery vendors for the other components of the e-discovery process? What is the cost to purchase, implement, and adopt an e-discovery solution for some or part of the e-discovery? What impact does having an in-house e-discovery cost have on your legal spend? Answer these questions by going to the accounting department and running a few reports to get an accurate estimate. If this is not available, then alternative paths exist, such as meeting with the CFO of your company to determine the current spend to e-discovery vendors. Our experience has suggested that if you spend more than $5,000 per-case with an e-discovery vendor to identify, collect, or preserve and you have more than 20 active matters a year, it might pay to evaluate bringing some of the e-discovery activities in-house. While bringing e-discovery in-house sounds daunting, the reality is that although front-end work for counsel and technologists exists, the times savings, peace of mind, and the monetary cost savings can be substantial and often outweigh the initial costs incurred in setting up and getting an

3 e-discovery solution operating. Counsel should be mindful when calculating the monetary cost that the total cost of ownership of an e-discovery solution is more than just the software itself. Counsel must be mindful that there will be technology costs (storage, server, and head-count) and legal costs (in-house person to manage and oversee the process). A company can incur the following costs depending on the e-discovery solution or service being sourced: Purchase new technology assets to administer the solution (e.g., Purchase a machine and several additional software applications to ensure litigation hold software operates properly); additional technology head count to support the machine; hire someone to administer the legal holds and ensure the litigation hold solution software is being utilized by counsel. While the total cost of using an e-discovery vendor or e-discovery system is higher than just the prices of the software, additional benefits are realized that go beyond being able to administer compliant legal holds, including: Avoiding the need to retain counsel to administer the litigation hold beyond validating that you are preserving as required; knowing that the company has mitigated the real-world risk that comes with an ad-hoc litigation hold system; saving money by avoiding the costly exercise of working with outside counsel of chasing down IT or employees to ensure the litigation hold letter was delivered arguably this is priceless. The above highlights some of the additional costs and benefits that should be included when calculating the cost-benefit of bringing e-discovery in-house. 5. Testing, Testing, Testing: scalability, security, usability, accuracy, and etc. While everything should work in the demo, it should also be tested with larger data sets, and preferably with your own data. If the e-discovery provider or software vendor says it is going to cost a couple of bucks to run a proof of concept: pay it. Why? It is better to pay a little up front than to go all in with a single software solution or vendor, only to lose your shirt (and your data!) in the process. This tip applies whether you are testing e-discovery software or an outside vendor service. The problem with using vendor data to run a test, is that their data is meant to highlight how smooth and efficient their software is. But the real world is anything but smooth sailing, especially when it comes to e-discovery. Using data from a prior case will give you an idea of how the software compares to prior software, as well as if the testing software is challenged with the same hurdles as the previous software. 6. Before you buy e-discovery software make sure you have the internal protocols and processes to address the use of e-discovery software or services. Preparation is the best preventative measure you can take. Make sure internal case handling protocols map to the software or services you are using. Maintaining a clear schedule of tasks and checklists will keep all parties on the same page and timeline, as well as clearly define expectations for each team member. These internal protocols should also include detailed plans on managing pre-litigation tasks, such as issuing a litigation hold notice. If you don't have protocols and process addressing vendor software or services, every time the software is used by a different member of the legal team, a different ad hoc process will emerge. This translates to more time and money spent re-documenting the e-discovery process and members of the legal team being given multiple sets of instructions on how to run a case. 7. Identify an internal owner of the e-discovery system. It is critical that there is an internal owner working with their fellow in-house counsel, outside counsel, and other vendors and is responsible for managing the system on a daily basis, resolving issues, and ensuring that the system is being used.

4 While it may seem counter-intuitive to bring in yet another person to the process, having a single person responsible for the coordination of identification, preservation, collection, search, and production of ESI will help you realize substantial savings and lower e-discovery risks overall. Often, this individual can also prove to be an invaluable resource in assisting their in-house colleagues and outside counsel in the often complex search and production process. 8. Investigate the long term viability an e-discovery solution or vendor. Software and technology changes rapidly, unlike the long-term nature of litigation. Consequently when evaluating an e-discovery solution or vendor, it is critical that counsel perform a risk analysis to ensure that the vendor is financially stable, meaning they are unlikely to file for bankruptcy. You do not want to invest in software only for it to disappear from the market. While it is possible to put software code in escrow, this is a high-risk solution. A company should also be mindful of the fact that it is very possible the software provider or solution provider will be acquired, as there is a great deal of activity in the e-discovery vertical, so counsel should make sure that the contract terms cover the life cycle of the caseload or provide a process by which the company can migrate to another vendor or solution. 9. Involve the Chief Information Officer in the selection process. Today, the gap between IT and legal is certainly shrinking, which is great for many reasons. However, if counsel engages IT after a solution is selected, they risk the solution not actually working. Almost all e-discovery solutions require some IT support, which usually translates into headcount to ensure the systems are available to run an e-discovery solution. Of course, any e-discovery system is handling sensitive documents, so ensuring the security of the environment within which the e-discovery solution is also tantamount and usually requires input from IT at some level. For example, when a company buys an e-discovery identification and collection platform, it will most likely require internal IT assets to assist legal in identifying and collecting data. Another benefit of dialoging with IT pre-purchase is that counsel will get a better grasp of the support costs. For example, we know of several great e-discovery predictive coding solutions that operate great in Windows environment, but when they are run in a non-windows environment installing software patches and updates can be a bit trickier and require additional costs. 10. Verify that the company s demand is sufficient to justify the investment. Often overlooked when selecting an e-discovery software solution is whether your company s case load justifies bringing such a system in-house, even if the budget is available. It is prudent for counsel to verify that the company s case load is sufficient to justify the investment and share this information with the technology stakeholder as well, to avoid IT purchasing a solution that is not necessary. At larger companies, the case load assessment requires counsel to reach across different legal groups to determine the current case load, and while this process may seem tedious it is essential. For example, a mid-size company might think that they do not have an active enough case docket to justify buying an e-discovery solution. However, if the legal team reaches out to the compliance department such a solution might be a huge cost saver, because that department is managing dozens of internal investigations and would benefit by having an in-house e-discovery platform to manage such investigations. With this tip, unlike evaluating the cost-benefit for the legal department, the focus is on ascertaining the internal demand for an e-discovery solution across the entire organization. The information in this Top Ten should not be construed as legal advice or legal opinion on specific facts and should not be considered representative of the views of its authors, its sponsors, and/or the ACC. This Top Ten is not intended as a definitive statement on the subject addressed. Rather, it is intended to serve as a tool providing practical advice and references for the busy in-house practitioner and other readers.

5 Reprinted with permission from the Association of Corporate Counsel (ACC) 2013 All Rights Reserved.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product. Isaca EXAM - CISM Certified Information Security Manager Buy Full Product http://www.examskey.com/cism.html Examskey Isaca CISM exam demo product is here for you to test the quality of the product. This

More information

CLIENT INTAKE - CONFLICT OF INTEREST

CLIENT INTAKE - CONFLICT OF INTEREST CLIENT INTAKE - CONFLICT OF INTEREST SAMPLE INTAKE SHEET I CONFLICT OF INTEREST FORM Initial Client Consultation Interview Form The purpose of an initial consultation is for the attorney to understand

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK 03 Introduction 04 Step 1: Preparing for a breach CONTENTS 08 Step

More information

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies.

RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS. Award-winning visual e-discovery software delivers faster insights and superior case strategies. RINGTAIL A COMPETITIVE ADVANTAGE FOR LAW FIRMS Award-winning visual e-discovery software delivers faster insights and superior case strategies. Key reasons Ringtail should be the choice. The latest technology

More information

It s Not If But When: How to Build Your Cyber Incident Response Plan

It s Not If But When: How to Build Your Cyber Incident Response Plan CYBER SECURITY USA It s Not If But When: How to Build Your Cyber Incident Response Plan Lucie Hayward, Managing Consultant Michael Quinn, Associate Managing Director each day seems to bring news of yet

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Endpoint Security Can Be Much More Effective and Less Costly. Here s How Endpoint Security Can Be Much More Effective and Less Costly Here s How Contents Introduction More is not always better Escalating IT Security Budgets Ineffective management Need of the hour System management

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Why is Office 365 the right choice?

Why is Office 365 the right choice? Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

a publication of the health care compliance association MARCH 2018

a publication of the health care compliance association MARCH 2018 hcca-info.org Compliance TODAY a publication of the health care compliance association MARCH 2018 On improv and improving communication an interview with Alan Alda This article, published in Compliance

More information

SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks

SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks By Richard A. Blunk (Thermopylae Ventures, LLC) and Apprameya Iyengar (Morrison Cohen LLP) The SEC has continued

More information

The Upside to Active Mail Management - Five Reasons to Actively Manage Mail

The Upside to Active Mail Management - Five Reasons to Actively Manage Mail The Upside to Active Mail Management - Five Reasons to Actively Manage Mail A White Paper from Avalon Introduction As we are all aware, the state of mail management in most organizations is not good. Most

More information

Choosing the Right Cloud Computing Model for Data Center Management

Choosing the Right Cloud Computing Model for Data Center Management Choosing the Right Cloud Computing Model for Data Center Management www.nsi1.com NETWORK SOLUTIONS INCOPORATED NS1.COM UPDATING YOUR NETWORK SOLUTION WITH CISCO DNA CENTER 1 Section One Cloud Computing

More information

H O W T O I N S T R U C T Y O U R NEW USERS GUIDE TO INSTRUCTING PROCESS SERVER

H O W T O I N S T R U C T Y O U R NEW USERS GUIDE TO INSTRUCTING PROCESS SERVER H O W T O I N S T R U C T Y O U R NEW USERS GUIDE TO INSTRUCTING YOUR PROCESS SERVER PROCESS SERVER The Process Serving Industry Despite being an integral part of the litigation process, the process serving

More information

First Financial Bank. Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations

First Financial Bank. Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations Customer Profile First Financial Bank Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations A midsize community bank with a service

More information

Turning Risk into Advantage

Turning Risk into Advantage Turning Risk into Advantage How Enterprise Wide Risk Management is helping customers succeed in turbulent times and increase their competitiveness Glenn Tjon Partner KPMG Advisory Presentation Overview

More information

Making the case for SD-WAN

Making the case for SD-WAN Making the case for SD-WAN A practical guide to getting buy-in for your new network New challenges require a new network It isn t just that enterprise IT is changing rapidly it s that it s changing in

More information

CLOUD COMPUTING PRIMER

CLOUD COMPUTING PRIMER CLOUD COMPUTING PRIMER for Small and Medium-Sized Businesses CONTENTS 1 Executive Summary 2 ABCs of Cloud Computing An IT Revolution 3 The Democratization of Computing Cloud Computing Service Models SaaS

More information

CLOUD VoIP. A new competitive edge for your business. 10 Reasons why your business needs ASG Cloud PBX

CLOUD VoIP. A new competitive edge for your business. 10 Reasons why your business needs ASG Cloud PBX CLOUD VoIP. A new competitive edge for your business 10 Reasons why your business needs ASG Cloud PBX 1 Outrageously Affordable Lower Your Total Cost of Ownership 2 Minimal IT Support Required Business

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

SECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1

SECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1 SECURITY AUTOMATION BEST PRACTICES A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1 Introduction The best security postures are those that are built

More information

Incident Response and Cybersecurity: A View from the Boardroom

Incident Response and Cybersecurity: A View from the Boardroom IT, Privacy & Data Security Webinar Incident Response and Cybersecurity: A View from the Boardroom Gerard M. Stegmaier, Reed Smith Partner IT, Privacy & Data Security Samuel F. Cullari, Reed Smith Counsel

More information

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360

Product Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360 Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Solutionary helps prepare for the inevitable

Solutionary helps prepare for the inevitable Solutionary helps prepare for the inevitable Analyst: Wendy Nather 22 May, 2013 There's FUD (fear, uncertainty and doubt), and there's reality. In some cases, the difference is only in how you point it

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Exam4Tests.   Latest exam questions & answers help you to pass IT exam test easily Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : CISM Title : Certified Information Security Manager Vendor : ISACA Version : DEMO 1 / 10

More information

ACCENTURE & COMMVAULT ACCENTURE CLOUD INNOVATION CENTER

ACCENTURE & COMMVAULT ACCENTURE CLOUD INNOVATION CENTER & COMMVAULT CLOUD INNOVATION CENTER HYBRID CLOUD MANAGEMENT & OPTIMIZATION DATA MANAGEMENT CLOUD INNOVATION CENTER PUSHING CUSTOM CLOUD SOLUTIONS TO THE MAX. 2 CLOUD INNOVATION CENTER Cloud delivers undeniable

More information

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture Nick Rozanski Andy Longshaw Eoin Woods Sold! How to Describe, Explain and Justify your Architecture Objectives of Today If you are an architect who has to produce an Architectural Description, then this

More information

Contractors Guide to Search Engine Optimization

Contractors Guide to Search Engine Optimization Contractors Guide to Search Engine Optimization CONTENTS What is Search Engine Optimization (SEO)? Why Do Businesses Need SEO (If They Want To Generate Business Online)? Which Search Engines Should You

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

Recovery ROI: Doing More with Less. How to Save Time and Money when Recovering

Recovery ROI: Doing More with Less. How to Save Time and Money when Recovering Email Recovery ROI: Doing More with Less How to Save Time and Money when Recovering Email 2 2 3 4 4 6 The Cost of Recovering Email Storage Costs Infrastructure Costs Time Costs Human Resource Costs How

More information

IT Risk: Are You Prepared?

IT Risk: Are You Prepared? IT Risk: Are You Prepared? Presented by Jennifer Griveas and Michael Gray Who We Are Jennifer Griveas, Esq., is the Chief Human Resources Officer and General Counsel for the Eliza Jennings Senior Care

More information

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER EMAIL ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER preface The last few years have seen significant changes in the way organisations conduct business. There has been

More information

Cisco Director Class SAN Planning and Design Service

Cisco Director Class SAN Planning and Design Service Cisco Director Class SAN Planning and Design Service Rapidly Plan and Deploy a Cisco Director Class MDS Solution for More Efficient Storage Networking Service Overview Cisco s intelligent storage networking

More information

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,

More information

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary Aon Client Data Privacy Summary Table of Contents Our Commitment to Data Privacy 3 Our Data Privacy Principles 4 Aon Client Data Privacy Summary 2 Our Commitment to Data Privacy Data Privacy Backdrop As

More information

Security Automation Best Practices

Security Automation Best Practices WHITEPAPER Security Automation Best Practices A guide to making your security team successful with automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough

More information

archiving with Office 365

archiving with Office 365 Email archiving with Office 365 ISO CERTIFIED info@cryoserver.com www.cryoserver.com +44 (0) 800 280 0525 Table of Contents 1.0 Purpose of Document 2 2.0 Email archiving in Office 365 2 2.1 Deleted folder

More information

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES A Guide to Making Your Security Team Successful with Automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough Nut to Crack

More information

Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7

Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7 Research Publication Date: 12 March 2009 ID Number: G00165756 Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7 Michael A. Silver, Stephen Kleynhans For most organizations, skipping

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking

More information

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.591.4950 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams www.eprentise.com

More information

THE DEFINITIVE GUIDE

THE DEFINITIVE GUIDE THE DEFINITIVE GUIDE TO OPTIMIZE YOUR EMAIL MARKETING Mailrelay.com KEYS TO OPTIMIZE YOUR E-MAIL MARKETING 01 WHAT TO INCLUDE IN YOUR NEWSLETTERS? 02 HOW TO ACHIEVE A HIGH AVERAGE OF VIEWS? 03 HOW OFTEN

More information

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React

More information

10 Step Checklist for Your Next Website Redesign

10 Step Checklist for Your Next Website Redesign 10 Step Checklist for Your Next Website Redesign Introduction Introduction Every now and then your website needs a refresh. There are many good reasons for a website redesign, whether it s a rebranding,

More information

The case for cloud-based data backup

The case for cloud-based data backup IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

More information

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action 2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action April 11, 2018 Contact Information Casie D. Collignon Partner Denver 303.764.4037 ccollignon@bakerlaw.com

More information

SAPtips. Journal. Creating a Well-Developed Master Data Management Solution in BW. August/September 2005 Volume III Issue 4. SAPtips.

SAPtips. Journal. Creating a Well-Developed Master Data Management Solution in BW. August/September 2005 Volume III Issue 4. SAPtips. Page 1 Creating a Well-Developed Master Data Management Solution in BW By Arthur Pat Pesa, arthurpesa, inc Editor Note: Pat Pesa delivers another one-two-three punch with his discussion of developing,

More information

SECURITY THAT FOLLOWS YOUR FILES ANYWHERE

SECURITY THAT FOLLOWS YOUR FILES ANYWHERE SECURITY THAT FOLLOWS YOUR FILES ANYWHERE SOLUTIONS FOR EVERY INDUSTRY VERA FOR FINANCIAL SERVICES Financial services firms are more likely to be targeted in a cyberattack than other organizations. Changes

More information

Hybrid Cloud 1. ebookiness created by the HPE Europe Division of Ingram Micro

Hybrid Cloud 1. ebookiness created by the HPE Europe Division of Ingram Micro Hybrid Cloud 1 contents 3 Hybrid IT: the path to the Cloud HPE & Microsoft: the strongest commitment to the Hybrid cloud 4 5 Accelerate your business with the hybrid cloud offered by HPE and Azure Why

More information

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT ARE YOU REALLY READY TO EXECUTE A GLOBAL IOT STRATEGY? Increased demand driven by long-term trends of the Internet of Things, WLAN, connected LED

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

How to Write an MSSP RFP. White Paper

How to Write an MSSP RFP. White Paper How to Write an MSSP RFP White Paper Tables of Contents Introduction 3 Benefits Major Items of On-Premise to Consider SIEM Before Solutions Security Writing an RFP and Privacy 45 Benefits Building an of

More information

ARCHIVE ESSENTIALS

ARCHIVE ESSENTIALS EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has

More information

Making trust evident Reporting on controls at Service Organizations

Making trust evident Reporting on controls at Service Organizations www.pwc.com Making trust evident Reporting on controls at Service Organizations 1 Does this picture look familiar to you? User Entity A User Entity B User Entity C Introduction and background Many entities

More information

Consolidating servers, storage, and incorporating virtualization allowed this publisher to expand with confidence in a challenging industry climate.

Consolidating servers, storage, and incorporating virtualization allowed this publisher to expand with confidence in a challenging industry climate. ENGINEERED SOLUTIONS A PUBLISHING SUCCESS STORY DOING MORE WITH LESS Consolidating servers, storage, and incorporating virtualization allowed this publisher to expand with confidence in a challenging industry

More information

January How to Ensure Your Organization s Mail Process is Compliant

January How to Ensure Your Organization s Mail Process is Compliant January 2016 How to Ensure Your Organization s Mail Process is Compliant Executive Summary Executive Summary This white paper provides an overview of compliance for mail processing. It focuses on the role

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information

Grab Your Hard Hat Ten Steps for Successful Web Site Construction

Grab Your Hard Hat Ten Steps for Successful Web Site Construction Grab Your Hard Hat Ten Steps for Successful Web Site Construction By Deborah J Hoard After a recent conversation with my brother-in-law, who is a construction project manager, I realized how similar are

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Best practices in IT security co-management

Best practices in IT security co-management Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3

More information

Achieving & Maintaining E-Discovery Fitness

Achieving & Maintaining E-Discovery Fitness Advice from Fortune 1000 E-Discovery Experts: Achieving & Maintaining E-Discovery Fitness By Ari Kaplan, Principal, Ari Kaplan Advisors Advice from Counsel is sponsored by: Introduction Introduction Fitness

More information

McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention McAfee Total Protection for Data Loss Prevention Protect data leaks. Stay ahead of threats. Manage with ease. Key Advantages As regulations and corporate standards place increasing demands on IT to ensure

More information

Sword vs. Shield: Using Forensics Pre-Breach in a GDPR World. September 20, 2017

Sword vs. Shield: Using Forensics Pre-Breach in a GDPR World. September 20, 2017 Sword vs. Shield: Using Forensics Pre-Breach in a GDPR World September 20, 2017 The information and opinions expressed by our panelists today are their own, and do not necessarily represent the views of

More information

What It Takes to be a CISO in 2017

What It Takes to be a CISO in 2017 What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge

More information

Introducing Enterprise Architecture. into the Enterprise

Introducing Enterprise Architecture. into the Enterprise Introducing Enterprise Architecture into the Enterprise Washington - 21st October 2003 Chris Greenslade Chris@Architecting-the-Enterprise.com Introducing Enterprise Architecture 1 of 28 TA P16 1 Approach

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to

More information

Move Up to an OpenStack Private Cloud and Lose the Vendor Lock-in

Move Up to an OpenStack Private Cloud and Lose the Vendor Lock-in Move Up to an OpenStack Private Cloud and Lose the Vendor Lock-in Peace, commerce and honest friendship with all nations; entangling alliances with none. -Thomas Jefferson Introduction In business and

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

Next Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today

Next Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today : What Every GC Should Be Doing Today ZL TECHNOLOGIES, INC. WHITE PAPER ZL Technologies Inc. 2000 Concourse Drive, San Jose, CA. 95131. 408.240.8989. www.zlti.com Table of Contents Legal holds: What legal

More information

OPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement

OPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement MAXIMIZING TELECOM AND NETWORK OPTIMIZATION The current state of enterprise optimization, best practices and considerations for improvement AOTMP.com The Next Evolution of Telecom Management OVERVIEW As

More information

Cloud-based data backup: a buyer s guide

Cloud-based data backup: a buyer s guide IBM Global Technology Services IBM SmartCloud IBM Managed Backupi Cloud-based data backup: a buyer s guide How to choose a third-party provider to develop, implement and manage your data backup solution

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy. Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information

4 Hidden Budget-Killing PDF Software Pitfalls. And how to avoid them

4 Hidden Budget-Killing PDF Software Pitfalls. And how to avoid them 4 Hidden Budget-Killing PDF Software Pitfalls And how to avoid them 1 Do you know the real cost of your PDF software? It s more than some line items on a budget. Hidden PDF software costs can eat away

More information

General Data Protection Regulation (GDPR) The impact of doing business in Asia

General Data Protection Regulation (GDPR) The impact of doing business in Asia SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer

More information

PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION

PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION INSIGHTS The EU s new data protection regulation, known as the GDPR (General Data Protection Regulation), can impact your

More information

White Paper. How to Write an MSSP RFP

White Paper. How to Write an MSSP RFP White Paper How to Write an MSSP RFP https://www.solutionary.com (866) 333-2133 Contents 3 Introduction 3 Why a Managed Security Services Provider? 5 Major Items to Consider Before Writing an RFP 5 Current

More information

Making. the Most of FedRAMP. Industry Perspective INDUSTRY PERSPECTIVE

Making. the Most of FedRAMP. Industry Perspective INDUSTRY PERSPECTIVE Making INDUSTRY PERSPECTIVE the Most of FedRAMP Industry Perspective 1 Executive Summary When the Federal Risk and Authorization Management Program (FedRAMP) launched in 2012, cloud computing was a fairly

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Visual Studio Subscriptions Administration Guide

Visual Studio Subscriptions Administration Guide Visual Studio Subscriptions Administration Guide 2 Contents INTRODUCTION... 4 ROLES AND RESPONSIBILITIES OF A VISUAL STUDIO SUBSCRIPTIONS ADMINISTRATOR... 4 BENEFITS AND LIMITATIONS OF VISUAL STUDIO SUBSCRIPTIONS...

More information

How to choose a website design firm

How to choose a website design firm How to choose a website design firm 22 questions to ask before engaging in an important partnership Website development projects can be fraught with risk. Organizations often wonder: How can we be sure

More information