Content Discovery Reports

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

Presentation Transcript: Iron Mountain - E-mail Management
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Read this presentation transcript and free yourself from the daily hassles of e-mail management and fighting the inherent risks of e-mail Spam, viruses and noncompliance. Trust Iron Mountain's enterprise-class, cloud-based e-mail management service for 100% e-mail uptime at a cost savings of up to 60% versus on-premises solutions.
Posted: 21 Aug 2009 | Published: 01 Aug 2009

Iron Mountain

e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
sponsored by Symantec Corporation
BOOK: The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.
Posted: 09 Jun 2008 | Published: 07 Jun 2008

Symantec Corporation

Using Predictive Coding to Your E-Discovery Advantage
sponsored by TechTarget CIO
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

TechTarget CIO

Technology & Business from Sun and AMD
sponsored by Sun Microsystems, Inc.
EZINE: Inside this magazine, you'll find stories explaining why AMD processor-powered Sun solutions for storage and archiving, Microsoft Exchange 2007 and other applications are receiving rave reviews from customers and analysts alike. There are also several exclusive offers...
Posted: 20 Jul 2009 | Published: 20 Jul 2009

Sun Microsystems, Inc.

eBook - Email Retention: Standards and Practices
sponsored by TechTarget Security
EBOOK: Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

TechTarget Security

EMC SourceOne for Microsoft Exchange Server 2010
sponsored by EMC Corporation
DATA SHEET: Microsoft and EMC provide compelling new capabilities for managing your Microsoft Exchange 2010 e-mail, while meeting security, compliance, and eDiscovery requirements.
Posted: 03 May 2010 | Published: 03 May 2010

EMC Corporation

Symantec Enterprise Vault™ Intelligent Archiving and Email: Classification, Retention, Filtering, and Search
sponsored by Symantec Corporation, created by SearchExchange.com
PRODUCT LITERATURE: Email has become as mission critical as any other IT system requiring most organizations to evaluate their overall policies and systems for email management. Learn about the most important considerations for successful email archiving.
Posted: 11 Oct 2007 | Published: 01 Mar 2007

Symantec Corporation, created by SearchExchange.com

Presentation Transcript: Building a Comprehensive Notes/Domino Archiving Strategy
sponsored by Sherpa Software
PRESENTATION TRANSCRIPT: This presentation transcript explains why archiving Domino content (including email and applications) is necessary for most companies. Learn about current archiving tool trends and best practices for Domino. Discover how to enlist a strategy that will best fit your organization's archiving needs.
Posted: 25 Mar 2010 | Published: 25 Mar 2010

Sherpa Software

Is It Time for Automated Classification?
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText