Discovery Management Reports

Beyond Disaster Recovery: Becoming a Resilient Business Organization
sponsored by IBM Software Group
WHITE PAPER: Discover how to combine several risk management strategies into a single integrated one, making your infrastructure able to respond to the threat of disaster.
Posted: 05 Dec 2007 | Published: 01 Jan 2007

IBM Software Group

A Practical Approach to Records Management
sponsored by EMC Corporation
WHITE PAPER: Enterprise records management (ERM) is an important initiative for many organizations today. Learn about the diversity of records management requirements at the enterprise level and why other solutions fail to meet these requirements.
Posted: 01 Aug 2007 | Published: 01 Sep 2006

EMC Corporation

Considerations for Designing, Implementing, and Managing an Email Archive Solution
sponsored by Datalink and Symantec
WHITE PAPER: Email archiving is critical to providing archive, search and retrieval options for compliance and discovery mandates. Download this white paper for tips on selecting and implementing an appropriate and effective archive system.
Posted: 27 Sep 2007 | Published: 01 Sep 2007

Datalink and Symantec

e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
sponsored by Symantec Corporation
BOOK: The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.
Posted: 09 Jun 2008 | Published: 07 Jun 2008

Symantec Corporation

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

eGuide: Email Security and Compliance Best Practices
sponsored by TechTarget Security
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 04 Jan 2011 | Published: 04 Jan 2011

TechTarget Security

Is It Time for Automated Classification?
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText

Presentation Transcript: Iron Mountain - E-mail Management
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Read this presentation transcript and free yourself from the daily hassles of e-mail management and fighting the inherent risks of e-mail Spam, viruses and noncompliance. Trust Iron Mountain's enterprise-class, cloud-based e-mail management service for 100% e-mail uptime at a cost savings of up to 60% versus on-premises solutions.
Posted: 21 Aug 2009 | Published: 01 Aug 2009

Iron Mountain

A 15 Minute Guide: Information Lifecycle Management for Enterprise Content Management Users
sponsored by EMC Corporation
WHITE PAPER: Identify, manage, and protect key information assets. This 15 Minute Guide to ILM for Enterprise Content Management Users discusses the benefits that ILM can bring to the line of business and content management users.
Posted: 01 May 2006 | Published: 01 Mar 2006

EMC Corporation

Top Five Ways to Improve E-Discovery with Archiving
sponsored by Symantec Corporation
DATA SHEET: Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.
Posted: 26 Jun 2009 | Published: 21 Jan 2008

Symantec Corporation