Electronic Evidence Discovery Reports

Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage
sponsored by Iron Mountain
DATA SHEET: To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Iron Mountain

Reducing Costs, Compliance Woes and Customer Dissatisfaction with Distributed Claims Processing
sponsored by EMC Captiva
WHITE PAPER: This white paper discusses the advantages and benefits of implementing a distributed scanning and capture solution. Learn how to improve document management and better meet compliance requirements.
Posted: 10 Sep 2007 | Published: 01 Jan 2006

EMC Captiva

Email management suite
sponsored by Iron Mountain
VIDEO: Email management solutions are designed to simplify your email management complexities. In this brief Videocast, legendary British comic, John Cleese, explains why you should want a total email management suite.
Posted: 26 Jun 2008 | Premiered: 25 Jun 2008

Iron Mountain

eBook - Email Retention: Standards and Practices
sponsored by TechTarget Security
EBOOK: Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

TechTarget Security

A 15 Minute Guide: Information Lifecycle Management for Enterprise Content Management Users
sponsored by EMC Corporation
WHITE PAPER: Identify, manage, and protect key information assets. This 15 Minute Guide to ILM for Enterprise Content Management Users discusses the benefits that ILM can bring to the line of business and content management users.
Posted: 01 May 2006 | Published: 01 Mar 2006

EMC Corporation

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

Technology & Business from Sun and AMD
sponsored by Sun Microsystems, Inc.
EZINE: Inside this magazine, you'll find stories explaining why AMD processor-powered Sun solutions for storage and archiving, Microsoft Exchange 2007 and other applications are receiving rave reviews from customers and analysts alike. There are also several exclusive offers...
Posted: 20 Jul 2009 | Published: 20 Jul 2009

Sun Microsystems, Inc.

E-mail Recovery, Restoration, Search & Analysis
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
DATA SHEET: Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server backups and Information Store files and even from your live Exchange server.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Ontrack® PowerControls™ by Kroll Ontrack

Presentation Transcript: Building a Comprehensive Notes/Domino Archiving Strategy
sponsored by Sherpa Software
PRESENTATION TRANSCRIPT: This presentation transcript explains why archiving Domino content (including email and applications) is necessary for most companies. Learn about current archiving tool trends and best practices for Domino. Discover how to enlist a strategy that will best fit your organization's archiving needs.
Posted: 25 Mar 2010 | Published: 25 Mar 2010

Sherpa Software

4 issues caused by retaining too much unnecessary data
sponsored by DLT Solutions
EGUIDE: Access this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

DLT Solutions