sponsored by RSD
Posted:  17 Aug 2009
Published:  17 Aug 2009
Format:  PDF
Length:  9  Page(s)
Type:  White Paper
Language:  English
All over the world, in the past five years, corporate e-mail messages have become classified as "records," and so they are now subject to the same compliance mandates associated with other documents and information as part of the conduct of business. In light of this you need to ensure that your organization can meet e-discovery requirements, address board room concerns about risk exposure, and meet your auditor's requirements for compliance with an expanding range of regulations, such as Sarbanes-Oxley, DOD 5015.2, Moreq II, HIPAA, Gramm-Leach Bliley.

As more and more interactions and business transaction-related activity is taking place in email, soon E-mail alone is estimated to drive close to 10 exabytes (10 million terabytes) of archive storage in the next five years. It becomes clear that E-mail archiving is an information governance imperative.

This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions, which are:

  • Lighten workload on mail servers
  • Support audit and tracking of important mail exchanges, both internal and external
  • Treat email like other critical business documents relating to clients vendors and business partners

Read this paper to learn more about these technical challenges and how your organization can overcome them.

Backups | Data Security | Email Archiving | Email Management | Email Security Policies | Governance, Risk, Compliance (GRC) | Information Management | Information Standards | Regulatory Compliance | Risk Management

View All Resources sponsored by RSD

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement