Digital Evidence Discovery Reports

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

Technology & Business from Sun and AMD
sponsored by Sun Microsystems, Inc.
EZINE: Inside this magazine, you'll find stories explaining why AMD processor-powered Sun solutions for storage and archiving, Microsoft Exchange 2007 and other applications are receiving rave reviews from customers and analysts alike. There are also several exclusive offers...
Posted: 20 Jul 2009 | Published: 20 Jul 2009

Sun Microsystems, Inc.

eBook - Email Retention: Standards and Practices
sponsored by TechTarget Security
EBOOK: Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

TechTarget Security

Is It Time for Automated Classification?
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText

Presentation Transcript: Optimizing Business Performance with Automated Accounts Payable Processing for your SAP System
sponsored by ReadSoft
PRESENTATION TRANSCRIPT: In this transcript food pioneer Rich Products shares the strategies that streamlined their payable processes, consolidated AP processing from 19 locations to one and saved them six figures in discounts.
Posted: 05 Nov 2009 | Published: 05 Nov 2009

ReadSoft

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Symantec Enterprise Vault™ Intelligent Archiving and Email: Classification, Retention, Filtering, and Search
sponsored by Symantec Corporation, created by SearchExchange.com
PRODUCT LITERATURE: Email has become as mission critical as any other IT system requiring most organizations to evaluate their overall policies and systems for email management. Learn about the most important considerations for successful email archiving.
Posted: 11 Oct 2007 | Published: 01 Mar 2007

Symantec Corporation, created by SearchExchange.com

Understanding E-Discovery Software Requirements
sponsored by Exterro
WHITE PAPER: This IT buyer's guide dives into eDiscovery software requirements by highlighting the capabilities commonly needed by IT teams and how a web-based legal process management software suite meets these requirements.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Exterro

IBM FileNet Email Manager
sponsored by IBM ECM
WHITE PAPER: Read why organizations should consider solutions that provide the more extensive business benefits of email management capabilities and not just the basic operational benefits of email archiving.
Posted: 05 Sep 2007 | Published: 01 Jan 2007

IBM ECM

eGuide: Email Security and Compliance Best Practices
sponsored by TechTarget Security
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 04 Jan 2011 | Published: 04 Jan 2011

TechTarget Security