Digital Evidence Reports

Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage
sponsored by Iron Mountain
DATA SHEET: To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Iron Mountain

EMC SourceOne for Microsoft Exchange Server 2010
sponsored by EMC Corporation
DATA SHEET: Microsoft and EMC provide compelling new capabilities for managing your Microsoft Exchange 2010 e-mail, while meeting security, compliance, and eDiscovery requirements.
Posted: 03 May 2010 | Published: 03 May 2010

EMC Corporation

Why Organizations Need to Archive Email
sponsored by GFI Software
WHITE PAPER: Email has become an integral part of the business workflow. This paper explains why email archiving must be an integral part of every organization and examines the different methods for deploying and managing email archive solutions in an organization.
Posted: 23 Jan 2007 | Published: 24 Jan 2007

GFI Software

Best and worst practices for email archiving in Exchange Server
sponsored by Symantec Corporation
EGUIDE: Email administrators battle with Exchange Server maintenance and storage allocation while scurrying to meet stringent business plans and hunting down the CEO's lost email message. In this expert eguide from SearchExchange.com, learn how to store the right content in the right place for the right length of time.
Posted: 09 Sep 2011 | Published: 09 Sep 2011

Symantec Corporation

Decoding Predictive Technologies in E-Discovery
sponsored by Exterro
WHITE PAPER: This informative guide addresses common questions legal teams have about predictive technologies, and showcases how real-world users are taking advantage of these new capabilities.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Exterro

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Symantec Enterprise Vault for Microsoft Office SharePoint Server
sponsored by Symantec Corporation
DATA SHEET: Read this informative paper to learn how to manage storage costs, assist in legal discovery, automate the archiving of business critical data, and more, all while providing a seamless end-user experience
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Symantec Corporation

Top Five Ways to Improve E-Discovery with Archiving
sponsored by Symantec Corporation
DATA SHEET: Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.
Posted: 26 Jun 2009 | Published: 21 Jan 2008

Symantec Corporation

Information Lifecycle Governance Leader Reference Guide
sponsored by IBM
WHITE PAPER: Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

IBM