Information Security Research Library

Powered by


Due to the broad nature of e-discovery, it can be hard to discern what constitutes an e-discovery vendor. This webcast provides an overview of some product categories that can help offer insight into their strengths and weaknesses in the e-discovery process.

This webcast also discusses:

  • The role of email archival
  • Strengths and limitations of information classification tools
  • How to leverage SIMs, log managers and network management consoles
  • Search tools that can index content in a variety of resources for later discovery
  • Pros and cons of forensics tools
  • What to do about encryption


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.