e-Mail Archive Reports

The myth of email as proof of communication
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 08 Feb 2021 | Published: 02 Dec 2016

TechTarget ComputerWeekly.com

Storage Magazine October 2009: Guide to Snapshot Technologies
sponsored by TechTarget Storage
EGUIDE: The October 2009 edition of Storage Magazine Online focuses on snapshot technologies. Snapshots offer backup managers the ability to reduce RTOs and RPOs, but one size doesn’t fit all. Storage expert Marc Staimer explains how to evaluate and choose the best approach for your environment.
Posted: 16 Oct 2009 | Published: 13 Oct 2009

TechTarget Storage

Email archiving FAQ
sponsored by Symantec Corporation
EGUIDE: This exclusive FAQ guide has expert answers to 6 email archiving questions and addresses topics like the pros and cons of managed email archiving services, bandwidth requirements and more.
Posted: 19 Nov 2012 | Published: 19 Nov 2012

Symantec Corporation

Email archiving in Exchange: How to beat its limitations with a successful strategy
sponsored by Metalogix
EGUIDE: Discover how to successfully overcome the limitations of native Exchange 2010 archiving tools in this expert e-guide. Plus, gain insight into the key considerations to keep in mind when creating a smart email retention strategy.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Metalogix

Clipper NotesTM: In Search of the Long-Term Archiving Solution – Tape Delivers Significant TCO Advantage over Disk
sponsored by Oracle Corporation
WHITE PAPER: Putting to rest many of the claims that tape has passed its prime, this Clipper Note from The Clipper Group confirms that tape can be an important cost-saving storage technology for long-term archiving of big files in a tiered storage architecture.
Posted: 11 Mar 2012 | Published: 07 Jun 2011

Oracle Corporation

Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
sponsored by TechTarget Security
EZINE: With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
Posted: 27 Jul 2011 | Published: 20 Jul 2011

TechTarget Security

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Reducing Archiving Costs by Implementing Email Labelling Technology
sponsored by Boldon James
WHITE PAPER: This paper offers an alternative approach to archive policy selection that uses email message labelling technology. View now to learn how labelling removes the need for end-users to understand archiving, and instead allow them to apply labels to each email message, ultimately reducing your email archiving costs.
Posted: 20 Jul 2011 | Published: 20 Jul 2011

All resources sponsored by Boldon James

Top strategies to master an Exchange 2010 migration
sponsored by TechTarget Data Center
EGUIDE: Find out how you can avoid the most common mistakes that Exchange admins make when migrating to Exchange 2010 in this e-guide. Plus, gain tips for how to properly document and plan your migration.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Data Center

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
sponsored by Mimecast
WHITE PAPER: The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

Mimecast