Software  >   Systems Software  >   Data Management Software  >  

e-Mail Discoverability Software

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Discoverability SoftwareReports
 
A Guide to Understanding Messaging Archiving
sponsored by Sunbelt Software
WHITE PAPER: This analyst paper by Osterman Research discusses the several reasons to implement a messaging archiving system and provide an overview of ten vendors whose offerings are focused squarely on the archiving space.
Posted: 15 Feb 2008 | Published: 06 Aug 2008

Sunbelt Software

E-Discovery, Case Management & Litigation Hold: Comprehensive Archive and Search Capability to Meet Legal and Regulatory Requirements
sponsored by Mimecast
DATA SHEET: Mimecast Unified Email Management™ is a cost effective Software-as-a-Service solution that offers integrated E-Discovery, Litigation Hold and Case Managment functionality, giving you the tools you need to rapidly execute data preservation policies and email discovery requests and guard against the risk of failing to produce required information.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Mimecast

Workgroup Connections Notes eDiscovery
sponsored by Workgroup Connections, An IBM Partner
PRODUCT OVERVIEW: This comprehensive offering provides an immediate and long-term solution that helps companies apply cost-saving best practices, reduce risk and improve the management of their eDiscovery efforts.
Posted: 19 Mar 2009 | Published: 19 Mar 2009

Workgroup Connections, An IBM Partner

Email Archiving: A Proactive Approach to e-Discovery
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them.
Posted: 04 Jul 2008 | Published: 01 Jul 2008

Proofpoint, Inc.

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Waiting to Upgrade: Understanding Archiving and eDiscovery Limitations in Exchange 2010
sponsored by Sherpa Software
WHITE PAPER: Microsoft Exchange Server is a powerful enterprise messaging tool that has proven to be very successful over the years. This white paper, sponsored by Sherpa Software, outlines the various archiving and eDiscovery features in Exchange 2010, examines how they work, and discusses various limitations in their deployment.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

Sherpa Software

Symantec Enterprise Vault Intelligent Archiving and Email
sponsored by Symantec Corporation
WHITE PAPER: Standard email archive tools treat every message the same, wasting valuable storage space. Learn why every organization should add intelligence to its archiving policies.
Posted: 08 May 2007 | Published: 01 May 2007

Symantec Corporation

Stop paying millions for eDsicovery
sponsored by SanDisk Corporation
CASE STUDY: This informative resource dives into a case study of one organization that harnessed flash optimized software to reduce their eDiscovery costs.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

SanDisk Corporation

5 Critical Factors to In-House eDiscovery Success
sponsored by Clearwell Systems
ANALYST REPORT: eDiscovery for civil litigation is a fact of life in the enterprise. This Technology in Brief, written by Christine Taylor form the Taneja Group, will discuss the top 5 critical factors of an in-house eDiscovery solution.
Posted: 13 Oct 2009 | Published: 01 Aug 2009

Clearwell Systems

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement