Messaging Archiving Reports

E-Book: Creating an Enterprise Content Management (ECM) strategy: Tips and techniques for developing or updating your ECM plan
sponsored by Perceptive Software
EBOOK: This E-book from an ECM expert offers advice on how organizations can apply ECM technology and techniques as well as insight into issues such as how programs can be funded and organized successfully. Learn some of the leading best practices that can help ensure that your organization’s ECM strategy effectively supports your overall business goals.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Perceptive Software

Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ
sponsored by Symantec Corporation
EGUIDE: This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Symantec Corporation

Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
sponsored by Google
EZINE: Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

E-Guide: Climbing the Uphill Battle of Exponential Data Growth
sponsored by Symantec Corporation
EGUIDE: This guide provides a simple yet reliable approach to securing data for the long term though the efficient optimization of IT resources and a set of straightforward best practices for data protection. Learn archiving best practices, how to choose a data archiving tool, and how to put together the best data archiving strategy for your business.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Symantec Corporation

Storage Magazine September 2009: The Lowdown on Solid-State Storage
sponsored by TechTarget Storage
EZINE: Storage Magazine Online September 2009 features a cover story updating the speedy evolution of Solid-State Storage – and what factors are transforming this technology from a niche to standard practice for storage shops.
Posted: 31 Aug 2009 | Published: 01 Sep 2009

TechTarget Storage

Definitive Guide to Exchange Server 2010 Migration: Chapter 3: Exchange 2003 to Exchange 2010: Making the Transition
sponsored by Dell, Inc. and Intel®
EGUIDE: In this chapter, our Exchange Server expert explains the prerequisites and imperative steps to help you smoothly transition to Exchange 2010.
Posted: 16 Aug 2011 | Published: 16 Aug 2011

Dell, Inc. and Intel®

Virtualizing your Exchange Server: Fact vs. fiction
sponsored by TechTarget Data Center
EBOOK: Find out what's fact and what's fiction about virtualizing your Exchange Server. What steps should you take, and how can you ensure success? Explore all these questions and more in this e-book.
Posted: 14 Dec 2011 | Published: 14 Dec 2011

TechTarget Data Center

8 Point Plan to Eliminate PST Files
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.
Posted: 20 May 2014 | Published: 20 May 2014

C2C Systems UK

Compliance Frameworks That Enhance e-Discovery Effectiveness
sponsored by AXS-One, a Daegis Company
EGUIDE: The threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

AXS-One, a Daegis Company

Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
sponsored by TechTarget Security
EZINE: With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
Posted: 27 Jul 2011 | Published: 20 Jul 2011

TechTarget Security