Content Discovery Reports

Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER: This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Exterro

E-mail Recovery, Restoration, Search & Analysis
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
DATA SHEET: Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server backups and Information Store files and even from your live Exchange server.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Ontrack® PowerControls™ by Kroll Ontrack

Your Backup Is Not an Archive
sponsored by Symantec Corporation
WHITE PAPER: Data growth, budget pressure, rising service-level requirements, and new technologies like virtualization strain the capabilities of traditional backup and recovery processes, but recent advances in data protection and management unlock an optimized strategy. Read on to learn more.
Posted: 27 Dec 2010 | Published: 27 Dec 2010

Symantec Corporation

E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
sponsored by StoredIQ
EGUIDE: Is your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

StoredIQ

Symantec Enterprise Vault for Microsoft Office SharePoint Server
sponsored by Symantec Corporation
DATA SHEET: Read this informative paper to learn how to manage storage costs, assist in legal discovery, automate the archiving of business critical data, and more, all while providing a seamless end-user experience
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Symantec Corporation

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

The IBM ECM Portfolio: Reducing Risk through Effective Information Management
sponsored by IBM ECM
WHITE PAPER: Faced with mounting regulatory pressures and the climbing cost of litigation, businesses in virtually every industry cite compliance as one of their top concerns. Learn how records management can help you effectively achieve compliance requirements.
Posted: 05 Sep 2007 | Published: 01 Jun 2007

IBM ECM

A Practical Approach to Records Management
sponsored by EMC Corporation
WHITE PAPER: Enterprise records management (ERM) is an important initiative for many organizations today. Learn about the diversity of records management requirements at the enterprise level and why other solutions fail to meet these requirements.
Posted: 01 Aug 2007 | Published: 01 Sep 2006

EMC Corporation

Email Archiving and Lifecycle Management for MS Exchange
sponsored by Instant InfoSystems
WHITE PAPER: Efficient storage of emails and attachments is recognized as one of the biggest challenges facing IT departments today. This white paper outlines how an email archiving solution can help reduce storage requirements and meet compliance regulations.
Posted: 02 May 2007 | Published: 01 May 2007

Instant InfoSystems

eGuide: Email Security and Compliance Best Practices
sponsored by TechTarget Security
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 04 Jan 2011 | Published: 04 Jan 2011

TechTarget Security