SAVE THE DATE! KMWORLD 2019 in Washington DC NOVEMBER 5 - 7, 2019


Records Management, E-Discovery, Compliance

Sherpa Software, Content Analyst Company ink deal Posted October 27, 2014

Updated UI and cross-browser, cross-platform support Posted October 16, 2014

Drive customer retention while guaranteeing compliance Posted October 13, 2014

KPMG LLP and MetricStream to offer consulting and technology services Posted October 08, 2014

Recommind integration with EMC e-mail, document management Posted September 17, 2014

Identity and access management Posted September 16, 2014

Launch cognitive computing platform Posted September 12, 2014

Unveils Version 6.0 of the Nuix engine Posted September 11, 2014

Dynamic access management, data security, compliance Posted September 05, 2014

AvePoint releases DocAve Governance Automation Service Pack 5 Posted September 04, 2014

We've published our annual list of Trend-Setting Products for nearly a decade and a half (more than a century in "technology years"),...This year, we looked at more than 600 products. Some have been around for a while, a testimony to the limber execution of their initial mission of adaptability. Others are relatively new. Posted September 01, 2014

For nearly two decades, large enterprises have complained about how much information they have to store, manage and protect. As regulations regarding that information steadily grow in number and complexity, they complain louder. The stakes—penalties and reputational damage for mishandled information—get higher. But a solution always seems just out of reach.

Fifteen years ago, there were no CIOs. We had VPs of MIS (management information services). If you'd asked one of them whether the problems of data growth, complexity and security—what we now call information governance—would be solved by 2014, the answer likely would have been "yes." A good bet, but wrong. . . .
Posted August 24, 2014

Enables predictive coding Posted August 19, 2014

Broadens Axcelerate platform Posted August 18, 2014

Whitebox Security releases WhiteOPS Version 3.3 Posted August 14, 2014

Low-cost, long-term data retention solution Posted July 28, 2014

Addresses information security challenges Posted July 07, 2014

kCura releases Relativity 8.2 Posted June 09, 2014

The e-discovery process is complex and offers multiple opportunities for missteps. Organizational and functional silos, a lack of visibility, miscommunication, duplication of efforts, overlooked details and missed data or hardware disposition, as well as the inherent unpredictability of the legal process, can contribute to problems. Without a mature e-discovery process, often the best an organization can hope to achieve is "organized chaos." Posted June 03, 2014

Smartlogic and TopQuadrant form alliance for unstructured and structured data Posted May 20, 2014

AvePoint releases DocAve 6 Service Pack 4 Posted May 08, 2014

HiSoftware releases Site Sheriff Posted May 05, 2014

OpenText unveils Discovery Suite Posted May 01, 2014

"Companies should think about how they organize information, revise it and move it through the whole lifecycle. A key part of governance is moving policies to the beginning of this cycle instead of waiting until the end to classify a record." Posted April 29, 2014

Unveils Experience Suite platform Posted April 17, 2014

Acquires Smart Data Consulting Posted April 10, 2014

KMWorld asked two experts, Matthew Nelson and Steve Marsh, who have helped public sector agencies with e-discovery implementations to discuss how government attorneys and IT leaders can work together to cope with the increasing volume of electronic data. Posted March 31, 2014

Data archiving and governance Posted March 24, 2014

Browser-based accessibility and privacy compliance testing Posted March 18, 2014

AvePoint and IAPP unite for new solution Posted March 17, 2014

Large organizations deal with employee departures and status changes on a near daily basis. Amidst the frenetic activity that surrounds employee movements, it can be easy for companies to overlook the very serious risk of critical information tied to legal or regulatory obligations being inadvertently deleted. Posted March 12, 2014

"You should know not just how you are protecting personal information but also why you are collecting it in the first place." Posted March 01, 2014

Designed to boost growth and innovation Posted February 24, 2014

Aptean introduces Respond to U.S. market Posted February 20, 2014

Unveils DiscoverStor for SMBs, SMEs Posted February 10, 2014

Automatically detects employee status changes Posted February 06, 2014

Improves content accessibility and business efficiency Posted February 05, 2014

Enterprise software and consumer technology have collided, escalating expectations among users for constant innovation and usability. Today's workplace is filled with individuals who receive frequent software updates on their smartphones and tablets, but are tethered to mission-critical software and desktop systems that are regularly three to five years out of date. . . . Posted January 28, 2014

Of the many challenges that bedevil e-discovery as the practice matures, two are most easily resolved by technology: the need to reduce keyword hits to a manageable number without omitting relevant results; and the need to view and search document in their native formats. Because thorough and effective search depends upon having the complete original text and metadata available via the native-format document, these needs overlap. . . . Posted January 28, 2014

It's no secret that the volume of information is increasing significantly, continuing on an exponential growth path. Forward-thinking organizations are recognizing critical business information as a corporate asset that needs to be protected and cost-effectively managed to maximize value and minimize risks and costs. In fact, 60% of IT security decision makers will make establishing or implementing a formal information risk management framework a top priority this year. . . . Posted January 28, 2014

Modern litigators know that Big Data has created a big chasm in every organization's ability to monitor, manage and mine critical data. Within most enterprises, the explosion of unstructured data is powering new levels of productivity, but distributing critical communications across different applications, on different devices, stored in disparate databases, has vastly complicated document discovery for auditing, investigation and litigation. . . . Posted January 28, 2014

Search KMWorld