| Similar Articles |
 |
InternetNews March 25, 2008 Judy Mottl |
Booming Archiving Market to Evolve Beyond E-mail "Store and retrieve" requirements for e-mail are yesterday's news. New needs are spurring adoption and new roles for the technology.  |
T.H.E. Journal April 2009 Charlene O'Hanlon |
Don't Hit That 'Delete' Button! In response to new federal rules mandating organizations retain their electronic documents, districts are using outside providers to archive their in-house e-mails.  |
T.H.E. Journal December 2007 |
SurePath ShareLoader by Crossroads Systems Crossroads Systems has released SurePath ShareLoader, a new appliance designed to automate backups of both on-site and remote systems.  |
Wall Street & Technology October 20, 2006 |
E-mail Archiving for Five Bucks or Less A hosted e-mail archiving solution tends to have a lower total cost of ownership than an in-house store, according to a white paper written for e-mail archiving vendor Fortiva that breaks down the costs of e-mail archiving.  |
InternetNews December 20, 2007 Jennifer Schiff |
Enterprises Rule in Favor of e-Discovery, Thanks to FRCP The Federal Rules of Civil Procedure are forcing companies to adopt e-discovery solutions and processes, and storage vendors are all too happy to help.  |
CFO January 1, 2009 Marshall Krantz |
Can You Look It Up? Think it's hard to find something in your swollen E-mail inbox? Imagine searching through your company's entire archive.  |
Bank Systems & Technology July 29, 2008 Kieron Dowling |
The E-Mail Archive Can Also Serve as a Security Solution Implementing an e-mail archiving solution will enable companies to detect security breaches by implementing rules and policies that will check each e-mail being sent and flag potential violations.  |
Information Today December 2, 2010 |
Reed Tech Introduces Web Archiving Service The comprehensive web archiving service will help corporations, government, and professional services firms capture and preserve web-based content to support the growing need for litigation protection, e-discovery, and compliance with various laws and regulations.  |
InternetNews January 19, 2005 Clint Boulton |
Sun Solution Manages Compliance Sun Microsystems unveiled a package of hardware, software, and services designed to help enterprises address regulations, such as Sarbanes-Oxley and HIPAA.  |
InternetNews March 17, 2008 Judy Mottl |
Survey: Data Archival Efforts Inefficient New report cites weak archival strategies and high risk for data.  |
CRM June 24, 2011 Leonard Klie |
New IBM Analytics Technology Helps Companies Unlock Big Data IBM's new High Capacity Appliance can analyze up to 10 petabytes of data.  |
Wall Street & Technology November 18, 2008 Melanie Rodier |
E-Discovery Requests Loom Large for Financial Services Firms As the turmoil on Wall Street continues, a growing tide of litigation -- and e-discovery requests -- could engulf financial firms.  |
InternetNews November 3, 2008 Judy Mottl |
IBM Expands Ways to Get a Grip on Data IBM's new products promise better classification and retrieval processes.  |
InternetNews February 23, 2009 Judy Mottl |
Iron Mountain Goes Virtual With File Archive Document archiving player pushes new "storage-as-a-service" offering.  |
InternetNews February 27, 2008 Judy Mottl |
New Details, Lessons in White House E-Mail Debacle Some answers help to explain how millions of White House e-mails became lost - with some key archiving tips for enterprises, as well.  |
CIO January 26, 2010 Kim S. Nash |
Questions You Need Answered Before Going Cloud Cloud computing offers tempting affordability, but legal quandaries abound surrounding e-discovery. Experts advise CIOs to ask questions of their vendors up front.  |
InternetNews April 3, 2007 Paul Shread |
Mimosa Archives More Money E-mail archiving startup Mimosa Systems reports that it raised $17 million in its third round of funding for a total haul to date to $34.5 million.  |
Bank Systems & Technology December 1, 2006 Nancy Feig |
What Banks Don't Know About E-mail Archiving Can Hurt Them Overflowing e-mail in-boxes are more than just annoyances -- now, they're also liabilities. Financial institutions increasingly are being judged on the way they manage their e-mail, and they're getting hit hard if they're found to be doing it the wrong way.  |
CIO October 29, 2008 Kim S. Nash |
How Text Messaging and Facebook Can Get You in Legal Trouble It's hard to stop employees from using text messaging, Facebook and other online tools to talk about their work. But you can prepare to handle the consequences.  |
InternetNews September 29, 2010 |
Novell Issues New SUSE Linux Appliance Toolkit Open source vendor Novell is souping up its menu of capabilities for building and maintain Linux software applications with the new SUSE Appliance Toolkit 1.1.  |
InternetNews July 3, 2007 Paul Shread |
Zantaz Gets Archived Content archiving pioneer Zantaz gets bought by Autonomy for $375 million.  |
Bank Technology News March 1, 2008 Glen Fest |
Defensive Posturing: Subprime Suits Aloft Some companies have found opportunity in the subprime catastrophe. Due to an expected wave of lawsuits ignited by the credit crunch, firms offering electronic message archiving and other "e-discovery" technology are benefiting.  |
Wall Street & Technology September 21, 2006 McDougall & Malykhina |
Financial Firms Are Struggling to Manage, Archive and Monitor the Exponentially Growing Volume of Corporate E-mail Many financial firms have been bitten by e-mail compliance woes. Learn how to get control of e-mail before you become the next victim of the e-mail beast.  |
InternetNews January 25, 2011 |
BridgeSTOR Unveils Microsoft Storage Appliance Startup storage vendor takes the wraps off of its first appliance built for Microsoft System Center Data Protection Manager, promising high capacity optimization.  |
InternetNews July 20, 2007 Sean Michael Kerner |
IDC: SCM is Hot Secure content management is why the security appliance marketplace is having a hot year. It's a market that is moving from a software-only approach to the appliance form factor, much the same as other segments of threat management.  |