Instant Messaging (Communications) Reports

e-Book: Chapter 6 - Ten Hidden E-Discovery Hazards
sponsored by Symantec Corporation
WHITE PAPER: This paper explains Ten hidden e-discovery hazards reviewing everything from databases and storage to instant messages and smartphones which can help ward off e-discovery surprises.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

Symantec Corporation

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Archiving Lotus Domino for Storage Optimization and E-Discovery
sponsored by Symantec Corporation
WHITE PAPER: Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
Posted: 07 Aug 2007 | Published: 01 Jul 2007

Symantec Corporation

Microsoft Exchange 2007- End-to-End Messaging Infrastructure Solution
sponsored by Cisco, EMC, & VMware
WHITE PAPER: A complete end-to-end messaging solution in a virtualization-enabled platform for Microsoft Exchange 2007 can provide a number of technical and operational benefits. This document provides an overview of this end-to-end infrastructure that takes advantage of the best-of-class technologies from Cisco, EMC, and VMware.
Posted: 17 Mar 2009 | Published: 01 Dec 2008

Cisco, EMC, & VMware

e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
sponsored by Symantec Corporation
BOOK: The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.
Posted: 09 Jun 2008 | Published: 07 Jun 2008

Symantec Corporation

SCOPIA Connector for IBM Lotus Sametime
sponsored by RADVISION
PRODUCT LITERATURE: RADVISION's SCOPIA Conferencing Platform with SCOPIA Desktop brings advanced conferencing capability to IBM's next generation unified communications enhancing the instant messaging and conferencing capabilities of Lotus Sametime.
Posted: 09 Jun 2008 | Published: 28 Mar 2008

RADVISION

How Should an Enterprise Move towards Unified Communications?
sponsored by Avaya Inc.
WHITE PAPER: Avaya moves customers toward Unified Communications to support complex and flexible work environments. The consultative process begins with a business assessment to understand the communication patterns, and to see where business processes slow down.
Posted: 01 Jul 2008 | Published: 01 Jun 2008

Avaya Inc.

IBM Lotus Complete Collaboration Express Starter Pack
sponsored by IBM
SOFTWARE DEMO: Check out this software demo to see how the IBM Lotus Complete Collaboration Express Starter Pack works in conjunction with Lotus Domino and other applications to provide excellent collaboration capabilities and numerous other benefits.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

What's New With Microsoft Office Communications Server 2007 R2
sponsored by Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript explains the new features and functionality in the Office Communications Server 2007 R2, the application that continues to deliver on the Microsoft promise to streamline communications for users, give IT organizations the flexibility and control they need, and provide an extensible communications platform.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Microsoft

UC and Collaboration: Benefits and Market Drivers
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores the benefits collaboration can bring your enterprise and provides an in-depth look at the drivers forcing organizations to find a newer, better UCC solution for their employees to leverage.
Posted: 30 Jan 2013 | Published: 30 Jan 2013

TechTarget Security