e-Mail Discoverability Reports

Reducing Costs, Compliance Woes and Customer Dissatisfaction with Distributed Claims Processing
sponsored by EMC Captiva
WHITE PAPER: This white paper discusses the advantages and benefits of implementing a distributed scanning and capture solution. Learn how to improve document management and better meet compliance requirements.
Posted: 10 Sep 2007 | Published: 01 Jan 2006

EMC Captiva

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Considerations for Designing, Implementing, and Managing an Email Archive Solution
sponsored by Datalink and Symantec
WHITE PAPER: Email archiving is critical to providing archive, search and retrieval options for compliance and discovery mandates. Download this white paper for tips on selecting and implementing an appropriate and effective archive system.
Posted: 27 Sep 2007 | Published: 01 Sep 2007

Datalink and Symantec

The Problem of Enterprise Records Management
sponsored by EMC Corporation
WHITE PAPER: This white paper explains how records management solutions can be deployed flexibly and cost-effectively across the enterprise to meet the full spectrum of records management needs.
Posted: 01 Aug 2007 | Published: 01 Oct 2006

EMC Corporation

IBM FileNet Records Manager
sponsored by IBM ECM
WHITE PAPER: Learn how an Enterprise Content Management (ECM) solution can securely capture, declare, classify, store and dispose of both electronic and physical records according to fiscal, legal and regulatory requirements.
Posted: 05 Sep 2007 | Published: 01 Jan 2007

IBM ECM

Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
sponsored by Google
EZINE: Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Email Archiving and Lifecycle Management for MS Exchange
sponsored by Instant InfoSystems
WHITE PAPER: Efficient storage of emails and attachments is recognized as one of the biggest challenges facing IT departments today. This white paper outlines how an email archiving solution can help reduce storage requirements and meet compliance regulations.
Posted: 02 May 2007 | Published: 01 May 2007

Instant InfoSystems

Using Predictive Coding to Your E-Discovery Advantage
sponsored by TechTarget CIO
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

TechTarget CIO

Best practices for utilising SharePoint e-discovery capabilities
sponsored by Dell Software
EGUIDE: In this expert e-guide, discover how SharePoint 2010 can simplify e-discovery for your organisation. Plus, learn how to sell a governance plan to management by reminding them of the benefits.
Posted: 08 Sep 2011 | Published: 30 Aug 2011

Dell Software

eGuide: Email Security and Compliance Best Practices
sponsored by TechTarget Security
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 04 Jan 2011 | Published: 04 Jan 2011

TechTarget Security