Electronic Document Discovery Reports

4 issues caused by retaining too much unnecessary data
sponsored by DLT Solutions
EGUIDE: Access this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

DLT Solutions

Information Workplace Platforms: Oracle Vs. Microsoft
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn about Oracle and Microsoft workplace platforms strengths and weaknesses.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Oracle Corporation

Information Lifecycle Governance Leader Reference Guide
sponsored by IBM
WHITE PAPER: Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

IBM

Best and worst practices for email archiving in Exchange Server
sponsored by Symantec Corporation
EGUIDE: Email administrators battle with Exchange Server maintenance and storage allocation while scurrying to meet stringent business plans and hunting down the CEO's lost email message. In this expert eguide from SearchExchange.com, learn how to store the right content in the right place for the right length of time.
Posted: 09 Sep 2011 | Published: 09 Sep 2011

Symantec Corporation

Bruce Silver & Associates: A Practical Approach to Enterprise Records Management
sponsored by EMC Corporation
WHITE PAPER: Enterprise records management (ERM) is an important initiative for many organizations today. Learn about the diversity of records management requirements at the enterprise level and why other solutions fail to meet these requirements.
Posted: 12 Mar 2008 | Published: 12 Mar 2008

EMC Corporation

Deduplication Comes of Age
sponsored by NetApp
WHITE PAPER: The capacity of storage systems is rising at a breathtaking pace and using storage as efficiently as possible is critical. Read this white paper to learn about a new deduplication technology that can help you improve efficiency and save space - up ...
Posted: 11 Sep 2007 | Published: 01 Sep 2007

NetApp

Storage Networking Case Study: How Cisco IT Uses a SAN to Automate the Legal Discovery Process
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study describes Cisco IT's internal deployment of a storage area network (SAN) within the Cisco network, a leading-edge enterprise environment that is one of the largest and most complex in the world.
Posted: 08 Oct 2008 | Published: 08 Oct 2008

Cisco Systems, Inc.

Archiving Lotus Domino for Storage Optimization and E-Discovery
sponsored by Symantec Corporation
WHITE PAPER: Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
Posted: 07 Aug 2007 | Published: 01 Jul 2007

Symantec Corporation

Symantec Enterprise Vault™ Intelligent Archiving and Email: Classification, Retention, Filtering, and Search
sponsored by Symantec Corporation, created by SearchExchange.com
PRODUCT LITERATURE: Email has become as mission critical as any other IT system requiring most organizations to evaluate their overall policies and systems for email management. Learn about the most important considerations for successful email archiving.
Posted: 11 Oct 2007 | Published: 01 Mar 2007

Symantec Corporation, created by SearchExchange.com

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security