Protection and Privacy

Learn how to:

Protect information assets regardless of where they are
Guard against fraud and comply with regulations 
Reduce risk and cost by eliminating what you don’t need  
Attack your most obvious content problem -- email

1 - 10 Results out of 91

What’s your 20/20 Vision for 2020?

As this year comes to a close, it’s time to start putting together plans and goals for the coming year. Have you decided what you’ll strive to achieve in 2020? 

Join AIIM on Thursday, December 12th as leading industry professionals write the next chapter in the Intelligent Information Management story and describe the latest technologies and methodologies in their ideal IIM toolkit as well as how to use the right tools for the job in the new year.

AIIM Forum Europe

Join AIIM International and your peers as we deliver thought leadership, market insights and expert advice through a one-day programme of educational seminars and a major showcase of the latest information management innovations in London, UK.

Best Practices in Intelligent Information Management: Focus on Analytics Services

As one of three core technologies comprising Intelligent Information Management (IIM) Analytics Services provides organizations with automated tools to prepare ALL of its information – both structured and unstructured -- for machine learning. 

Join us for a live event on Thursday, November 7th as practitioners from a variety of industries share their use of analytics services for data recognition/extraction/standardization, metadata/taxonomy management, PII identification/protection, and user personalization. They’ll address these important questions:

  • What are the key drivers motivating the use of Analytics Services technologies?
  • What obstacles do users face during the acquisition and implementation of Analytics Services?
  • What business results have they achieved through Analytics Services?
  • How has this impacted the organization’s overall IIM plans and processes?
  • With the use of Analytics Services, what’s next in building their organizational roadmap?

 

The Pros & Cons of Cloud Content Services: An Evaluation Criteria That Will Make Business Users & IT Happy

In this webinar, we'll identify the various patterns – pros and cons – that emerge along the journey to the cloud so that you can better determine its suitability for your unique use case.

How to Become a Modern Records Manager (and a Business Enabler)

AIIM How-to Guide

A handy guide designed to help you learn how effective records management can position you as a business enabler and drive improvement organization-wide.

Top Tips to Bridge the Gap Between Security Awareness and Security Action

By shifting the conversation of how you think about – and secure – all your information assets, you’ll be in a much better position to bridge the gap between security awareness and security action. This webinar will provide you with top tips to help your organization.

5 Key Data Points about Office 365

Infographic

Office 365 is on the rise - what does that mean for the way we manage, store, and protect our information? Download this FREE infographic for a look at the key data points.

Why is Information Disposition Just as Important as Information Retention

Tip Sheet

As the amount of information we're managing continues to rapidly increase, those without leveraging the use of automation risk being consumed by the rising tide of information. Learn how to address your information ROT (redundant, obsolete, and trivial) with automation.

Why is Information Security Critical to the Next Generation of Digital Business

Tip Sheet

Information risk continues to grow all throughout our businesses. Learn why information security has become the key to success in the digital age.

Why is Perimeter Information Security No Longer Enough?

Tip Sheet

As we continue to change how we work with the use of technology like mobile, perimeter security just may no longer be enough. Download this tip sheet to learn how the security focus needs to shift in two directions –to information end points and to information entry points.
Back to Top Back to Top