Electronic Evidence Reports

eBook-- Defining an Email-Archiving Policy
sponsored by Symantec Corporation
EBOOK: Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
Posted: 09 Jul 2009 | Published: 09 Jul 2009

Symantec Corporation

Archiving Compliance with Sunbelt Exchange Archiver
sponsored by Sunbelt Software
WHITE PAPER: Archiving for compliance is an important step in securing your company's future. Learn how to implement an email archiving solution that will minimize the burden on your Exchange server and help to avoid costly legal penalties in this whitepaper.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER: This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Exterro

IBM FileNet Email Manager
sponsored by IBM ECM
WHITE PAPER: Read why organizations should consider solutions that provide the more extensive business benefits of email management capabilities and not just the basic operational benefits of email archiving.
Posted: 05 Sep 2007 | Published: 01 Jan 2007

IBM ECM

Anatomy of an Archiving Project White Paper
sponsored by IBM
WHITE PAPER: Companies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

Bloor Research - Data Discovery Spotlight
sponsored by Talend
ANALYST REPORT: In this Spotlight Report, Research Director Philip Howard explains why data discovery is of fundamental importance to data integration, data quality, and many other projects ranging from business intelligence through master data management to data governance and data archival. Read on to learn more about the importance of data discovery.
Posted: 28 Jul 2009 | Published: 28 Feb 2009

Talend

A 15 Minute Guide: Information Lifecycle Management for Enterprise Content Management Users
sponsored by EMC Corporation
WHITE PAPER: Identify, manage, and protect key information assets. This 15 Minute Guide to ILM for Enterprise Content Management Users discusses the benefits that ILM can bring to the line of business and content management users.
Posted: 01 May 2006 | Published: 01 Mar 2006

EMC Corporation

Symantec Enterprise Vault for Microsoft Office SharePoint Server
sponsored by Symantec Corporation
DATA SHEET: Read this informative paper to learn how to manage storage costs, assist in legal discovery, automate the archiving of business critical data, and more, all while providing a seamless end-user experience
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Symantec Corporation

Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage
sponsored by Iron Mountain
DATA SHEET: To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Iron Mountain

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security