The value of filtering & culling in eDiscovery

Gathering electronically stored information (ESI) for the purposes of litigation is a common task for an IT department. Often this takes the form of a ‘collect everything’ approach and with it huge volumes are sent out for processing and review.  … Read More

Finding PCI & PII in Your Organization

Just about every day, the national headlines include stories about data breaches that have compromised the security of thousands or millions of confidential electronic records, often containing credit card or social security numbers.  Usually, these occur at organizations found to be in violation of various regulations or industry standards … Read More

Small Business & Policy Enforcement: Why it Matters

Many companies in the small or medium business (SMB) space assume that information governance and policy management concerns are solely the domain of large enterprises. That misconception couldn’t be further from the truth.  SMBs are bound by the same regulations … Read More

Should Dark Data be brought to light?

Dark data has become a topic of interest for many companies over the last few years.  So, is the term as scary as it sounds?  What is dark data?  Gartner defines dark data as “the information assets organizations collect, process … Read More

Searching for External Email Messages

Customers often ask how to use Discovery Attender to identify messages sent from or to someone outside their organization.  When dealing with a single domain, say sherpasoftware.com for example, the search is straightforward. You would simply use ‘Address’ as your … Read More

The future of cloud email and why it’s here to stay

Cloud-based email offerings have become one of the hottest trends and is a consideration for IT departments across the globe.  By migrating email to hosted providers, companies allow vendors to handle all the pesky details of hardware and network management while they focus … Read More