Digital Evidence Discovery Reports

eBook - Email Retention: Standards and Practices
sponsored by TechTarget Security
EBOOK: Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

TechTarget Security

Making The Business Case For Content Analytics
sponsored by IBM
EGUIDE: Can you demonstrate how content analytics tools can benefit your organization? This expert guide reveals best practices for building a strong business case for content analytics software. Gain insights from successful use cases, social media examples, and much more.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

IBM

The Growing Importance of E-Discovery on Your Business
sponsored by Google Apps
WHITE PAPER: The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

Google Apps

Symantec Enterprise Vault™ Intelligent Archiving and Email: Classification, Retention, Filtering, and Search
sponsored by Symantec Corporation, created by SearchExchange.com
PRODUCT LITERATURE: Email has become as mission critical as any other IT system requiring most organizations to evaluate their overall policies and systems for email management. Learn about the most important considerations for successful email archiving.
Posted: 11 Oct 2007 | Published: 01 Mar 2007

Symantec Corporation, created by SearchExchange.com

Top Five Ways to Improve E-Discovery with Archiving
sponsored by Symantec Corporation
DATA SHEET: Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.
Posted: 26 Jun 2009 | Published: 21 Jan 2008

Symantec Corporation

e-Book: Chapter 5 - Understanding the Data Collection Process
sponsored by Symantec Corporation
WHITE PAPER: Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
Posted: 06 Aug 2008 | Published: 01 Aug 2008

Symantec Corporation

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

ESG: Improving the Legal Discovery Process with More Efficient Information Management
sponsored by EMC Corporation
WHITE PAPER: This paper examines how one solution provider, EMC, is helping customers address electronic discovery challenges by helping customers manage their information infrastructure more effectively.
Posted: 13 Mar 2008 | Published: 01 Aug 2007

EMC Corporation

Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage
sponsored by Iron Mountain
DATA SHEET: To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Iron Mountain

Information Lifecycle Governance Leader Reference Guide
sponsored by IBM
WHITE PAPER: Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

IBM