IT Management  >   Systems Operations  >   Data Management  >  

Electronic Evidence

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Evidence Reports
 
eGuide: Email Security and Compliance Best Practices
sponsored by SearchSecurity.com
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 04 Jan 2011 | Published: 04 Jan 2011

SearchSecurity.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER: This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Exterro

Workgroup Connections Notes eDiscovery
sponsored by Workgroup Connections, An IBM Partner
PRODUCT OVERVIEW: This comprehensive offering provides an immediate and long-term solution that helps companies apply cost-saving best practices, reduce risk and improve the management of their eDiscovery efforts.
Posted: 19 Mar 2009 | Published: 19 Mar 2009

Workgroup Connections, An IBM Partner

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group

Your Backup Is Not an Archive
sponsored by Symantec Corporation
WHITE PAPER: Data growth, budget pressure, rising service-level requirements, and new technologies like virtualization strain the capabilities of traditional backup and recovery processes, but recent advances in data protection and management unlock an optimized strategy. Read on to learn more.
Posted: 27 Dec 2010 | Published: 27 Dec 2010

Symantec Corporation

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Enterprise Vault and Microsoft Business Online Productivity Suite
sponsored by Symantec Corporation
WHITE PAPER: Microsoft Business Productivity Online Suite (BPOS) is a set of Microsoft hosted messaging and collaboration services, which includes Exchange, SharePoint, LiveMeeting and Office Communications Online. This document outlines the integration of the offsite BPOS email service with an on-premises Enterprise Vault solution.
Posted: 18 Nov 2010 | Published: 18 Nov 2010

Symantec Corporation

Information Workplace Platforms: Oracle Vs. Microsoft
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn about Oracle and Microsoft workplace platforms strengths and weaknesses.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Oracle Corporation

Regulations Shift Focus on Outbound Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them.
Posted: 10 Jul 2008 | Published: 10 Jul 2008

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement