Electronic Evidence Discovery Reports

Symantec Enterprise Vault for Microsoft Office SharePoint Server
sponsored by Symantec Corporation
DATA SHEET: Read this informative paper to learn how to manage storage costs, assist in legal discovery, automate the archiving of business critical data, and more, all while providing a seamless end-user experience
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Symantec Corporation

A 15 Minute Guide: Information Lifecycle Management for Enterprise Content Management Users
sponsored by EMC Corporation
WHITE PAPER: Identify, manage, and protect key information assets. This 15 Minute Guide to ILM for Enterprise Content Management Users discusses the benefits that ILM can bring to the line of business and content management users.
Posted: 01 May 2006 | Published: 01 Mar 2006

EMC Corporation

IBM FileNet Email Manager
sponsored by IBM ECM
WHITE PAPER: Read why organizations should consider solutions that provide the more extensive business benefits of email management capabilities and not just the basic operational benefits of email archiving.
Posted: 05 Sep 2007 | Published: 01 Jan 2007

IBM ECM

eGuide: Email Security and Compliance Best Practices
sponsored by TechTarget Security
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 04 Jan 2011 | Published: 04 Jan 2011

TechTarget Security

Best and worst practices for email archiving in Exchange Server
sponsored by Symantec Corporation
EGUIDE: Email administrators battle with Exchange Server maintenance and storage allocation while scurrying to meet stringent business plans and hunting down the CEO's lost email message. In this expert eguide from SearchExchange.com, learn how to store the right content in the right place for the right length of time.
Posted: 09 Sep 2011 | Published: 09 Sep 2011

Symantec Corporation

Making The Business Case For Content Analytics
sponsored by IBM
EGUIDE: Can you demonstrate how content analytics tools can benefit your organization? This expert guide reveals best practices for building a strong business case for content analytics software. Gain insights from successful use cases, social media examples, and much more.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

IBM

Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
sponsored by Google
EZINE: Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Is It Time for Automated Classification?
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google