IT Management  >   Systems Operations  >   Data Management  >  

eDiscovery

RSS Feed    Add to Google    Add to My Yahoo!
eDiscovery Reports
 
DLP Content Discovery: Best Practices for Stored Data Discovery and Protection
sponsored by Symantec Corporation
WHITE PAPER: According to author Rich Mogull, one of the most under-appreciated aspects of DLP solutions is content discovery. Read this paper on DLP and discover features, best practices for deployment, and example use cases to illustrate how it functions.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Symantec Corporation

Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage
sponsored by Iron Mountain
DATA SHEET: To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Iron Mountain

e-Book: Chapter 5 - Understanding the Data Collection Process
sponsored by Symantec Corporation
WHITE PAPER: Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
Posted: 06 Aug 2008 | Published: 01 Aug 2008

Symantec Corporation

Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER: This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Exterro

8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies
sponsored by FTI Technology
WHITE PAPER: In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set.
Posted: 16 Nov 2009 | Published: 04 Nov 2009

FTI Technology

Regulations Shift Focus on Outbound Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them.
Posted: 10 Jul 2008 | Published: 10 Jul 2008

Proofpoint, Inc.

Sunbelt Exchange Archiver (SEA): Your Email Archiving Solution
sponsored by Sunbelt Software
PRODUCT LITERATURE: SEA is a comprehensive email archiving solution from Sunbelt Software that effectively addresses today's corporate email communication needs.
Posted: 03 Sep 2008 | Published: 29 Aug 2008

Sunbelt Software

The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing eDiscovery and Compliance Obligations with IT Operational and Budget Constraints
sponsored by Iron Mountain
ANALYST REPORT: This IDC White Paper discusses the practical approaches the IT organization must consider so that it can effectively execute on the corporation's compliance and eDiscovery objectives while still meeting the IT organization's budget, application performance, and service-level objectives.
Posted: 01 Jun 2010 | Published: 01 Mar 2010

Iron Mountain

eGuide: Email Security and Compliance Best Practices
sponsored by Google Postini
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

Google Postini

Mirapoint RazorSafe™
sponsored by Mirapoint Software, Inc.
DATA SHEET: RazorSafe operates in a low-risk, passive mode and archives all emails, while ensuring minimal impact on your email infrastructure. RazorSafe uses open, standard protocols (POP, IMAP, SMTP) to archive all emails sent or received from the email server.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

Mirapoint Software, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement