IT Management  >   Systems Operations  >   Data Management  >  

Digital Evidence Discovery

RSS Feed    Add to Google    Add to My Yahoo!
Digital Evidence DiscoveryReports
 
Integrating Social Media Into Your Content Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Gartner predicts that by 2013 half of all organizations will be asked to provide content from social media sources for e-discovery lawsuits, yet most organizations’ social media management policies are non-existent or counter-productive. Find out how to protect yourself from the top concerns that accompany social media.
Posted: 13 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Proofpoint TechBrief: Email Archiving and Exchange 2010
sponsored by Proofpoint, Inc.
WHITE PAPER: Proofpoint ARCHIVE™ greatly extends the email retention features promised in Exchange 2010, delivers the robust features and performance that enterprises truly require and makes those features available today, without requiring an upgrade to the 2010 platform. Read this techbrief to learn more!
Posted: 09 Mar 2010 | Published: 09 Mar 2010

Proofpoint, Inc.

Is It Time for Automated Classification?
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText

Data Security in the E-discovery Process
sponsored by SearchCompliance.com
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

SearchCompliance.com

Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER: This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Exterro

Presentation Transcript: Iron Mountain - E-mail Management
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Read this presentation transcript and free yourself from the daily hassles of e-mail management and fighting the inherent risks of e-mail Spam, viruses and noncompliance. Trust Iron Mountain's enterprise-class, cloud-based e-mail management service for 100% e-mail uptime at a cost savings of up to 60% versus on-premises solutions.
Posted: 21 Aug 2009 | Published: 01 Aug 2009

Iron Mountain

Email Archiving: To SaaS or Not to Saas?
sponsored by Proofpoint, Inc.
WHITE PAPER: This paper discusses the overall benefits and drawbacks of SaaS solutions, outlining the type of situations that are best suited for this kind of implementation.
Posted: 13 Jan 2009 | Published: 12 Jan 2009

Proofpoint, Inc.

Five Essential Considerations for Exchange 2007® Implementations
sponsored by Dell India
WHITE PAPER: Read this white paper to learn about five essential considerations administrators should address while planning for any Exchange 2007 migration.
Posted: 17 Mar 2010 | Published: 01 Aug 2008

Dell India

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Email Archiving: A Proactive Approach to e-Discovery
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them.
Posted: 04 Jul 2008 | Published: 01 Jul 2008

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement