1,039 Results for:E-discovery and compliance

  • Sort by: 

Archiving technology boosts storage efficiency

By Phil Goodwin 07 Jun 2013

A core best practice for effective storage management is archiving technology that frees up storage resources, improves performance and protects data that must be retained. Read More

Ten tips to expose and expunge shadow IT at your company

By Steve Weissman 23 Jun 2015

Bringing shadow IT projects into the sunlight requires change management and getting employees to embrace IT-sanctioned technologies. Read More

Session border controllers ensure safe IP telephony links

By Michael Brandenburg 14 Oct 2010

Session border controllers (SBCs) deliver both external telephony services and remote platform connectivity to the enterprise IP telephony platform. The role of an SBC is one of translator and protector, providing ... Read More

Selecting predictive coding technology: Key questions to ask

By Ben Cole 16 Aug 2013

In this podcast, learn about predictive coding and how to ensure you're choosing the best technology for your e-discovery processes. Read More

New Exchange 2013 features tighten integration with SharePoint

By Brien Posey 04 Dec 2012

Two new Exchange 2013 features strengthen Microsoft's commitment to making SharePoint and Exchange integration airtight. Read More

Getting to know your compliance options in Exchange 2013

By Michael Van Horenbeeck 15 Oct 2013

Keeping up with the regulations that come with new technology can be tough, but certain Exchange features can help organizations stay compliant. Read More

SearchStorage podcasts: Storage technologies

30 Oct 2008

SearchStorage editors are always looking for new ways to make it easier and quicker for our readers to keep up with the latest in storage technologies. Here you'll find a list of expert podcasts discussing storage ... Read More

Predictive coding: It's not just for e-discovery any more

By Ben Cole 02 May 2013

(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) By now, everyone in the world of information management is aware of the staggering increases in ... Read More

Information security certification guide: Forensics

By Ed Tittel 30 Jan 2018

This information security certificate guide looks at vendor-neutral computer forensics certifications for IT professionals interested in cyber attribution and investigations. Read More

IBM buys Ustream, launches cloud video service

By Katherine Finnell 29 Jan 2016

This week in UC news, IBM has acquired Ustream and added cloud-based video to its cloud service portfolio, while a survey found the hosted PBX market is steadily growing. Read More