Discovery Management Reports

Storage Networking Case Study: How Cisco IT Uses a SAN to Automate the Legal Discovery Process
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study describes Cisco IT's internal deployment of a storage area network (SAN) within the Cisco network, a leading-edge enterprise environment that is one of the largest and most complex in the world.
Posted: 08 Oct 2008 | Published: 08 Oct 2008

Cisco Systems, Inc.

Beyond Disaster Recovery: Becoming a Resilient Business Organization
sponsored by IBM Software Group
WHITE PAPER: Discover how to combine several risk management strategies into a single integrated one, making your infrastructure able to respond to the threat of disaster.
Posted: 05 Dec 2007 | Published: 01 Jan 2007

IBM Software Group

Is It Time for Automated Classification?
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText

Waiting to Upgrade: Understanding Archiving and eDiscovery Limitations in Exchange 2010
sponsored by Sherpa Software
WHITE PAPER: Microsoft Exchange Server is a powerful enterprise messaging tool that has proven to be very successful over the years. This white paper, sponsored by Sherpa Software, outlines the various archiving and eDiscovery features in Exchange 2010, examines how they work, and discusses various limitations in their deployment.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

Sherpa Software

Top Five Ways to Improve E-Discovery with Archiving
sponsored by Symantec Corporation
DATA SHEET: Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.
Posted: 26 Jun 2009 | Published: 21 Jan 2008

Symantec Corporation

E-mail Recovery, Restoration, Search & Analysis
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
DATA SHEET: Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server backups and Information Store files and even from your live Exchange server.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Ontrack® PowerControls™ by Kroll Ontrack

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Stop paying millions for eDsicovery
sponsored by SanDisk Corporation
CASE STUDY: This informative resource dives into a case study of one organization that harnessed flash optimized software to reduce their eDiscovery costs.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

SanDisk Corporation

Considerations for Designing, Implementing, and Managing an Email Archive Solution
sponsored by Datalink and Symantec
WHITE PAPER: Email archiving is critical to providing archive, search and retrieval options for compliance and discovery mandates. Download this white paper for tips on selecting and implementing an appropriate and effective archive system.
Posted: 27 Sep 2007 | Published: 01 Sep 2007

Datalink and Symantec

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google