eMail Evidence Discovery Reports

Records Management: A Real World Guide
sponsored by IBM ECM
WHITE PAPER: Read this white paper to learn how records management as part of an enterprise content management (ECM) solution delivers substantial ROI through reduction in corporate risk, lower operational costs, and improved productivity.
Posted: 05 Sep 2007 | Published: 05 Sep 2007

IBM ECM

Why Organizations Need to Archive Email
sponsored by GFI Software
WHITE PAPER: Email has become an integral part of the business workflow. This paper explains why email archiving must be an integral part of every organization and examines the different methods for deploying and managing email archive solutions in an organization.
Posted: 23 Jan 2007 | Published: 24 Jan 2007

GFI Software

Beyond Disaster Recovery: Becoming a Resilient Business Organization
sponsored by IBM Software Group
WHITE PAPER: Discover how to combine several risk management strategies into a single integrated one, making your infrastructure able to respond to the threat of disaster.
Posted: 05 Dec 2007 | Published: 01 Jan 2007

IBM Software Group

E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
sponsored by StoredIQ
EGUIDE: Is your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

StoredIQ

Email Archiving and Lifecycle Management for MS Exchange
sponsored by Instant InfoSystems
WHITE PAPER: Efficient storage of emails and attachments is recognized as one of the biggest challenges facing IT departments today. This white paper outlines how an email archiving solution can help reduce storage requirements and meet compliance regulations.
Posted: 02 May 2007 | Published: 01 May 2007

Instant InfoSystems

Is It Time for Automated Classification?
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Bloor Research - Data Discovery Spotlight
sponsored by Talend
ANALYST REPORT: In this Spotlight Report, Research Director Philip Howard explains why data discovery is of fundamental importance to data integration, data quality, and many other projects ranging from business intelligence through master data management to data governance and data archival. Read on to learn more about the importance of data discovery.
Posted: 28 Jul 2009 | Published: 28 Feb 2009

Talend

eBook - Email Retention: Standards and Practices
sponsored by TechTarget Security
EBOOK: Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

TechTarget Security