Reducing the burden of FOIA

Responding to open records requests comes with the territory when you work for a government agency. Unfortunately, many struggle with compiling and producing the requested information in a timely manner. In this three-part series, Smarsh provides you with knowledge to help reduce the burden of responding to record requests, and to stay compliant with the Freedom of Information Act (FOIA) and state and local open records laws.
Get Whitepaper

The Public Sector Guide to Text Messaging Policy and Retention

This guide contains practical steps that will help public sector organizations and departments develop a text message policy and retention strategy to protect against the risk involved with use of this popular, universal form of communication. It also outlines some smart text recordkeeping practices so you’ll be better prepared to respond to open records requests or other e-discovery needs when they arise.

Get Whitepaper

Smarsh Electronic Communications Compliance Survey Report

Against the backdrop of political shifts in Washington and growing popular distrust of “big finance,” the seventh annual Smarsh survey of compliance professionals in the financial services industry reveals that the electronic communications compliance landscape has become broader, more complex and more scrutinized.

More firms are finding that gaps in retention and supervision programs have consequences. Examinations have become more comprehensive, with regulators focusing in particular on supervision processes. FINRA reported 99 books and records cases in 2016, resulting in $22.5million in fines. Compared to 2015, that represents a 423% increase in fines. Download our whitepaper to learn how you can protect your company!

Get Whitepaper

What is GDPR Compliance & How to Comply with Ease

Centralized AI-powered machine data analysis platform to help you maintain compliance.

Loom’s solution is a state of the art (SOTA) Artificial Intelligence Operating System platform that makes it easy for companies of all sizes to comply with GDPR.

Our solution empowers DevOps and IT professionals to speedily analyze both log and unstructured machine data for immediate visibility into the IT environments.

Our solution is designed with data protection and privacy in mind. The following features map how Loom helps users maintain compliance with a click of a button.

Download the whitepaper to learn more about GDPR compliance and Loom Systems' solution

Get Whitepaper

Public Safety Departments & Text Messaging – Simplify Public Records with Policies and Procedures

Prior to fully embracing SMS/text messaging, organizations need to assess how and why their employees want to use text communications, develop and communicate use policies, and ensure all information sent via text can be retained and archived. Remember, any communication sent or received by government organizations—including public safety departments and their employees—is subject to open records requests.

In this report, we examine how public safety agencies can create policies that allow for compliant use of SMS/text messaging, and how to retain and archive those communications for a more efficient response to open records requests.

Read our guide to learn:

  • How other public safety departments are using text messaging
  • What you need to consider for public record requests
  • What to consider when building your communications policy
Get Whitepaper

Lessons in Archiving for Public Sector Agencies

In this three-part e-book, Don DeLoach walks public sector organizations through the key elements needed to respond quickly and accurately to open records requests: identifying what information needs to be retained and archived, best practices and procedures for retaining communications, finding and implementing an automated solution, and the important roles stakeholders play in the records response process.

From a CIOs perspective this eBook covers:

  • The challenges of archiving communications
  • Choosing the right archiving solution for your organization
  • Internal policies and rules
View Now

The Public Sector Guide to Social Media Strategy and Policy

Social media can greatly improve communication, deliver constituent services, help optimize processes, and aid response to emergencies within your community. It can also allow public sector organization employees to be more accountable, transparent, and open. Along with the benefits comes increased awareness of security, privacy, and records management challenges on social media.

A solid social media strategy can help your organization and departments connect with the community in an easy, time and cost-effective manner that most people can access. The strategy doesn’t need to be complicated. Whether this is your first time developing a social media strategy, or you already have one in place, remember to keep it simple. Here are a few things to consider while developing or rounding-out your strategy:

  • Available social media tools and capabilities
  • Internal policies and approvals
  • External requirements for preserving records and responding to information requests
  • Your organization’s overall objectives and the needs of the community
Get Whitepaper

5 Actions to take for an Airtight Mobile Use Strategy in Government

Text messaging is an immediate and simple way of communicating, so many government employees prefer it over email or other traditional methods. However, FOIA laws require all electronic communications used for business to be archived and available for public record requests. It doesn’t matter whether an employee uses his/her personal or government-issued cell phone, both are fair game.

In this guide we’ll show how public sector organizations can build an airtight mobile strategy. Learn about device scenarios, policy creation, mobile device management, and the archiving process.

Read our guide to learn:

  • Device ownership scenarios – advantages and disadvantages
  • Key questions to answer for an airtight policy
  • How to retain & report text message content
Get Whitepaper

3 Ways Text Messaging Exposes Financial Services Firms to Massive Risk

While 97% of Americans with a smartphone use them to send texts, many organizations don’t have any supervision or management of mobile communication in place. While it is intuitive and reliable, text messaging can pose serious litigation and reputation risks if employees are conducting business conversations without clear policies and supervision. Read this guide to understand the ways companies are exposed to risk through texting and how you can reap the benefits of text message archiving with implementation of smart policies and solutions.

Get Whitepaper

How to Build a Security Operations Center (on a Budget)

Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.

The chapters you'll read focus on:

  • The roles and responsibilities involved in a security operations team
  • The key processes you'll need to build a security operations center
  • The essential security monitoring tools needed for a fully functional security operations center
  • How threat intelligence is used in a security operations center
  • Real world examples of how organizations have used AlienVault USM to power their security operations center

For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported by multiple monitoring technologies and real-time threat updates doesn’t seem all that DIY. Download this eBook today to learn how to build a SOC without requiring costly implementation services or large teams to manage it.

Get Whitepaper

Open Source Network Security Tools for Beginners

With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security.

In this white paper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.

You'll learn about using open source tools for:

  • Network discovery
  • Network IDS
  • Vulnerability scanning
  • Penetration testing

Download your copy today and learn how to get started with open source network security tools.

Get Whitepaper

Beginner’s Guide to Open Source Intrusion Detection Tools

This whitepaper provides an overview of Open Source IDS and the various IDS tools available today. Whether you need to monitor hosts or the networks connecting them to identify the latest threats, these are some of the best open source intrusion detection (IDS) tools available to you.

You'll learn:

  • The functions of network & host-based IDS, and file integrity monitoring
  • A list of the most popular Open Source IDS tools
  • Pros and cons of the various tools available today
Get Whitepaper

Detecting “WannaCry” Ransomware with AlienVault USM

“WannaCry” ransomware has hit tens of thousands of networks, bringing down hospital services, telecommunication services, financial institutions, and more.

In this free white paper, you'll learn:

  • How WannaCry infects systems
  • What you should update immediately
  • How to scan your environment for the MS17-010 vulnerability
  • How to continuously monitor your environment for intrusions and indicators of an exploit

Download this white paper now to learn how you can start using AlienVault USM to detect threats like WannaCry ransomware today.

Get Whitepaper

Don’t Overlook Your Email Archiving Systems

Today, business users need on-the-go access to all their critical data, which includes emails, documents and attachments. For IT administrators, striking the balance between productivity for users and compliance needs for the organization is necessary.

A September 2017 commissioned study conducted by Forrester Consulting shows 92% of business users believe easily finding emails and related documents using search functions is important or critical to the ability to do their job.

Download the study to discover more of Forrester Consulting’s important findings on the email archiving needs of modern business users—and how you can meet them.

Get Whitepaper