Content Discovery Reports

Presentation Transcript: Legal Discovery and Your Messaging Environments - What's Important and Why!
sponsored by Daegis
PRESENTATION TRANSCRIPT: In this presentation transcript, learn how Lotus Notes Administrators play an important role in legal discovery. Find out how archiving systems can help meet compliance standards and gain an understanding of business requirements around e-discovery. Discover how to make sure your company’s information is properly archived.
Posted: 02 Dec 2009 | Published: 02 Dec 2009

Daegis

Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER: This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Exterro

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

Storage Networking Case Study: How Cisco IT Uses a SAN to Automate the Legal Discovery Process
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study describes Cisco IT's internal deployment of a storage area network (SAN) within the Cisco network, a leading-edge enterprise environment that is one of the largest and most complex in the world.
Posted: 08 Oct 2008 | Published: 08 Oct 2008

Cisco Systems, Inc.

A 15 Minute Guide: Information Lifecycle Management for Enterprise Content Management Users
sponsored by EMC Corporation
WHITE PAPER: Identify, manage, and protect key information assets. This 15 Minute Guide to ILM for Enterprise Content Management Users discusses the benefits that ILM can bring to the line of business and content management users.
Posted: 01 May 2006 | Published: 01 Mar 2006

EMC Corporation

Deduplication Comes of Age
sponsored by NetApp
WHITE PAPER: The capacity of storage systems is rising at a breathtaking pace and using storage as efficiently as possible is critical. Read this white paper to learn about a new deduplication technology that can help you improve efficiency and save space - up ...
Posted: 11 Sep 2007 | Published: 01 Sep 2007

NetApp

Is It Time for Automated Classification?
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText

Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage
sponsored by Iron Mountain
DATA SHEET: To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Iron Mountain

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google