IT Management  >   Systems Operations  >   Data Management  >  

Enterprise Search and Discovery

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Search and DiscoveryReports
 
Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Effective E-Discovery: Best practices, processes and team building tips
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Research shows that general counsels are frustrated by lack of control, collaboration and communication regarding e-discovery processes. This classroom will focus on ways to optimize communication, get team members on the same page, and how to better leverage and integrate IT into the e-discovery process.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

eBook-- Defining an Email-Archiving Policy
sponsored by Symantec Corporation
EBOOK: Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
Posted: 09 Jul 2009 | Published: 09 Jul 2009

Symantec Corporation

Presentation Transcript: Building a Comprehensive Notes/Domino Archiving Strategy
sponsored by Sherpa Software
PRESENTATION TRANSCRIPT: This presentation transcript explains why archiving Domino content (including email and applications) is necessary for most companies. Learn about current archiving tool trends and best practices for Domino. Discover how to enlist a strategy that will best fit your organization's archiving needs.
Posted: 25 Mar 2010 | Published: 25 Mar 2010

Sherpa Software

Presentation Transcript: Does Exchange 2010 Eliminate the Need for 3rd Party Archiving Solutions?
sponsored by Proofpoint, Inc.
PRESENTATION TRANSCRIPT: The release of Exchange Server/Outlook 2010 brought about tools that allow for integrated archiving, retention and discovery functionality. In this transcript, our expert explains these new features and why you may not want to rely on these tools as your full archiving solution quite yet.
Posted: 12 Aug 2010 | Published: 12 Aug 2010

Proofpoint, Inc.

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Email Archiving: To SaaS or Not to Saas?
sponsored by Proofpoint, Inc.
WHITE PAPER: This paper discusses the overall benefits and drawbacks of SaaS solutions, outlining the type of situations that are best suited for this kind of implementation.
Posted: 13 Jan 2009 | Published: 12 Jan 2009

Proofpoint, Inc.

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.

The E-Discovery “How-To” Guide: Practical Recommendations for Streamlining Corporate E-Discovery
sponsored by Clearwell Systems
WHITE PAPER: This paper breaks down the e-discovery process into phases, discusses best practices and relevant technologies for each phase, and provides a matrix to guide an e-discovery team’s decision making process.
Posted: 13 Oct 2009 | Published: 01 Oct 2008

Clearwell Systems

Is It Time for Automated Classification?
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement