eMail Search and Discovery Software Reports

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Data Security in the E-discovery Process
sponsored by SearchCompliance.com
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

SearchCompliance.com

E-mail Recovery, Restoration, Search & Analysis
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
DATA SHEET: Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server backups and Information Store files and even from your live Exchange server.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Ontrack® PowerControls™ by Kroll Ontrack

Symantec Enterprise Vault™ Intelligent Archiving and Email: Classification, Retention, Filtering, and Search
sponsored by Symantec Corporation, created by SearchExchange.com
PRODUCT LITERATURE: Email has become as mission critical as any other IT system requiring most organizations to evaluate their overall policies and systems for email management. Learn about the most important considerations for successful email archiving.
Posted: 11 Oct 2007 | Published: 01 Mar 2007

Symantec Corporation, created by SearchExchange.com

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER: This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Exterro

Best practices for utilising SharePoint e-discovery capabilities
sponsored by Dell Software
EGUIDE: In this expert e-guide, discover how SharePoint 2010 can simplify e-discovery for your organisation. Plus, learn how to sell a governance plan to management by reminding them of the benefits.
Posted: 08 Sep 2011 | Published: 30 Aug 2011

Dell Software

Decoding Predictive Technologies in E-Discovery
sponsored by Exterro
WHITE PAPER: This informative guide addresses common questions legal teams have about predictive technologies, and showcases how real-world users are taking advantage of these new capabilities.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Exterro

Email management suite
sponsored by Iron Mountain
VIDEO: Email management solutions are designed to simplify your email management complexities. In this brief Videocast, legendary British comic, John Cleese, explains why you should want a total email management suite.
Posted: 26 Jun 2008 | Premiered: 25 Jun 2008

Iron Mountain

E-Discovery, Case Management & Litigation Hold: Comprehensive Archive and Search Capability to Meet Legal and Regulatory Requirements
sponsored by Mimecast
DATA SHEET: Mimecast Unified Email Management™ is a cost effective Software-as-a-Service solution that offers integrated E-Discovery, Litigation Hold and Case Managment functionality, giving you the tools you need to rapidly execute data preservation policies and email discovery requests and guard against the risk of failing to produce required information.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Mimecast