Strive for IT Excellence

Take a Strategic Approach to Data Governance

With the tremendous growth in data comes a parallel increase in the importance of proper data governance. New data protection regulations, such as GDPR, make data governance a mandatory part of […]

The Broad Scope of Data Governance Means You Need Tools and Automation to Succeed

Data governance requires understanding your data, how it's created and used, and who is accessing it. Given the large volumes of data handled by almost every organization, using tools to help […]

Can Office 365 Meet Your eDiscovery Needs?

Increasing volumes of data and increasing volumes of compliance regulations are accelerating both the importance of eDiscovery and the challenges of managing the eDiscovery process. Solutions that […]

Enterprise Vault and Office 365, Part 2: Three Ways to Use Enterprise Vault and Office 365 Together

We talked in Part 1 about how the features in Veritas Enterprise Vault offer more comprehensive and flexible eDiscovery and data protection features than are available in Microsoft Office 365. […]

Enterprise Vault and Office 365, Part 1: Five Reasons to Use Enterprise Vault to Manage Data in Office 365

Maintaining control of your data is important even when it's stored in the cloud. While cloud providers like Office 365 offer services for backup, archiving, and eDiscovery, those services don't […]

Microsoft Security Patch Interferes With Enterprise Vault Shortcuts

Keeping up with security patches is unquestionably important. Unfortunately, sometimes patches have unintended side effects. That's the case with a recent Microsoft patch that's interfering with […]

Many Conversations Are Needed to Achieve Compliance

Backups are crucial to meeting your compliance obligations to protect and retain data, but the technology itself can't ensure compliance. You need strong communication between your IT team, your […]

Enterprise Vault Errors Flooding Your Event Logs??

With Enterprise Vault (EV) you can sometimes see strange behavior in the event logs. For example, reoccurring 29014 errors with an interesting host name or Vault ID:

Protect Data Against Tampering By Focusing on Data Integrity

The standard "CIA" model of computer security requires confidentiality, integrity, and availability. Data protection often focuses on preventing data theft and unauthorized access, viewing it as a […]

If Two People Can't Keep a Secret, How Can Your Entire Company?

Your corporate data is filled with secrets. Your own secrets, like business plans and intellectual property, and your customer's secrets, like account numbers. And your collection of data is […]

No More Posts