SlideShare a Scribd company logo
1 of 2
Download to read offline
SHERPA SOFTWARE ENTERPRISE SOLUTIONS
                                   Providing e-Discovery and information management solutions that are
                                   practical, reliable and affordable.
                                   Sherpa Software‘s Attender Utility solutions provide enterprise organizations extensive
                                   email management, PST administration, content filtering, electronic discovery and policy
                                   enforcement capabilities. Our solutions were developed to be as non-invasive as possible
                                   and do not require any additional hardware or software components. Sherpa’s award-
                                   winning products and services are designed to solve the e-Discovery and information man-
                                   agement challenges you face across your entire enterprise. Sherpa has been delivering
                                   these innovative solutions backed by superior customer service to our enterprise customers
                                   worldwide for over 10 years.


                Solutions for Email Storage, Policy Enforcement and Search & Discovery

       Data Management, Data Security and                                                  Securing Data
            Data Discovery Solutions
                                                                    With large amounts of critical and confidential information
Data Confidentiality and Compliance Standards solutions are
                                                                    passing through the email system, it is imperative that enter-
available from Sherpa Software to secure sensitive informa-
                                                                    prise organizations archive information to a secure location
tion. To build an effective data security strategy, all relevant
                                                                    where it can be managed and protected for extended periods
data must be located, reported on, secured in an archive,
                                                                    of time. Sherpa tools can easily archive data to any storage
purged when no longer relevant, and searched in response to
                                                                    device accessible to the network and once the information is
e-Discovery requests. Sherpa’s solutions provide comprehen-
                                                                    secured and indexed, administrators can control the level of
sive management and content searching capabilities, while
                                                                    access rights provided to users, maintain audit trails of ar-
preventing data leakage through granular unit or enterprise
                                                                    chive activity and enforce retention policies on the content to
wide electronic email policies.
                                                                    purge data upon its expiration.

                        E-Discovery
                                                                                   Enforcing Email Policies
All organizations are required to know the location and the
scope of all electronically stored information (ESI) and have       Sherpa Software develops tools that help our clients identify,
the capability to quickly gather data in response to data discov-   manage and secure electronic data. Dozens of enterprise
ery requests. Sherpa's e-Discovery tools can effectively and        size clients have deployed Sherpa solutions to manage elec-
efficiently search files, messages and attachments located in       tronic data which may be at risk for data leakage exposing
Exchange mailboxes, PST files, public folders, Notes mail files,    proprietary information such as, credit card information, social
Domino databases, local databases, instant message logs and         security numbers or other confidential corporate data.
common file storage areas (.pdf, .zip, .doc, etc.). Once located,
multiple actions can be taken to address document discovery         Business critical information may exist in email contained in
requests and reduce legal exposure.                                 mailboxes and Public Folders, within documents on the cor-
                                                                    porate network or even on individual desktop machines. En-
           Enforce Regulatory Compliance                            forcing policies throughout the organization is an ideal strat-
                                                                    egy to control storage growth, minimize legal risk and better
Our data archiving solutions address legal, regulatory and cor-     manage overall data retention.
porate data archiving/retention requirements by enforcing poli-
cies, locating relevant content, securing information, protecting   Whether your focus is purging or securing information, it is
document authenticity and deleting information upon its expira-     important to define how long information is retained and
tion.                                                               where business communications are stored. Establishing and
                                                                    enforcing these types of rules will instill strong corporate stan-
                                                                    dards, both globally and by department, that build employee
                                                                    awareness of the risks associated with the dissemination of
                                                                    potentially harmful information.




                                     FREE trial versions at www.sherpasoftware.com
Solutions for Email Storage, Policy Enforcement and Search & Discovery

                Managing PST Content                                         Comply with Legal and Internal
                                                                               Information Requirements
PST content must be controlled and easily accessible. When         Sherpa software permits rapid compliance with discovery
critical information is stored locally on desktop or laptop com-   orders, regulatory information requests, internal informa-
puters, or scattered around your network, finding PST files        tion requests and other demands for information. This is
and collecting information can be a difficult and time-            critical, since compliance, particularly with regulatory re-
consuming task. Additionally, enforcing archiving, retention       quests, often requires rapid turnaround.
and deletion policies are much more difficult when data stores
are widely dispersed and not centrally accessible to IT staff.
                                                                            Delete Unnecessary Information
Sherpa’s products provide content PST discovery, migration
and management for desktop and network PST files by allow-         Sherpa tools enforce the deletion of both personal and non-
ing administrators to create flexible rules that monitor the       corporate email, thereby allowing shorter backup windows,
email infrastructure and automatically archive and enforce         saving valuable storage space and removing potentially dam-
corporate policies. Organizations can easily locate, access        aging content. Given that these types of email do not contain
and centrally manage local and network PST files while en-         business records, deleting them is an important step in maxi-
forcing policies, performing data archiving, deleting outdated     mizing the value of storage.
information, compacting PSTs and generating reports.




                            Representative Sherpa Software Enterprise Customers




About Sherpa Software
Sherpa Software provides award-winning software specifically designed to address E-discovery, email and PST management,
archiving and compliance requirements for Microsoft Exchange and Lotus Notes environments. Sherpa’s products are designed
to streamline administrative processes while offering flexible management architectures and reasonable pricing models to com-
panies of any size.

With products that address compliance, legal liability, storage and content management, we have allowed our clients to reduce
costs, minimize administration time, mitigate liabilities and secure information.

We have earned a solid reputation as a leading software provider offering unparalleled customer service and support. We pride
ourselves on the close relationships we share with our customers and work hard to be responsive to their needs.




                                                 www.sherpasoftware.com

More Related Content

More from Sherpa Software

Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationSherpa Software
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youSherpa Software
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesSherpa Software
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheSherpa Software
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Software
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationSherpa Software
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-DiscoverySherpa Software
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the NumbersSherpa Software
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Sherpa Software
 

More from Sherpa Software (11)

Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive Consolidation
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Sherpa Software Enterprise Solutions

  • 1. SHERPA SOFTWARE ENTERPRISE SOLUTIONS Providing e-Discovery and information management solutions that are practical, reliable and affordable. Sherpa Software‘s Attender Utility solutions provide enterprise organizations extensive email management, PST administration, content filtering, electronic discovery and policy enforcement capabilities. Our solutions were developed to be as non-invasive as possible and do not require any additional hardware or software components. Sherpa’s award- winning products and services are designed to solve the e-Discovery and information man- agement challenges you face across your entire enterprise. Sherpa has been delivering these innovative solutions backed by superior customer service to our enterprise customers worldwide for over 10 years. Solutions for Email Storage, Policy Enforcement and Search & Discovery Data Management, Data Security and Securing Data Data Discovery Solutions With large amounts of critical and confidential information Data Confidentiality and Compliance Standards solutions are passing through the email system, it is imperative that enter- available from Sherpa Software to secure sensitive informa- prise organizations archive information to a secure location tion. To build an effective data security strategy, all relevant where it can be managed and protected for extended periods data must be located, reported on, secured in an archive, of time. Sherpa tools can easily archive data to any storage purged when no longer relevant, and searched in response to device accessible to the network and once the information is e-Discovery requests. Sherpa’s solutions provide comprehen- secured and indexed, administrators can control the level of sive management and content searching capabilities, while access rights provided to users, maintain audit trails of ar- preventing data leakage through granular unit or enterprise chive activity and enforce retention policies on the content to wide electronic email policies. purge data upon its expiration. E-Discovery Enforcing Email Policies All organizations are required to know the location and the scope of all electronically stored information (ESI) and have Sherpa Software develops tools that help our clients identify, the capability to quickly gather data in response to data discov- manage and secure electronic data. Dozens of enterprise ery requests. Sherpa's e-Discovery tools can effectively and size clients have deployed Sherpa solutions to manage elec- efficiently search files, messages and attachments located in tronic data which may be at risk for data leakage exposing Exchange mailboxes, PST files, public folders, Notes mail files, proprietary information such as, credit card information, social Domino databases, local databases, instant message logs and security numbers or other confidential corporate data. common file storage areas (.pdf, .zip, .doc, etc.). Once located, multiple actions can be taken to address document discovery Business critical information may exist in email contained in requests and reduce legal exposure. mailboxes and Public Folders, within documents on the cor- porate network or even on individual desktop machines. En- Enforce Regulatory Compliance forcing policies throughout the organization is an ideal strat- egy to control storage growth, minimize legal risk and better Our data archiving solutions address legal, regulatory and cor- manage overall data retention. porate data archiving/retention requirements by enforcing poli- cies, locating relevant content, securing information, protecting Whether your focus is purging or securing information, it is document authenticity and deleting information upon its expira- important to define how long information is retained and tion. where business communications are stored. Establishing and enforcing these types of rules will instill strong corporate stan- dards, both globally and by department, that build employee awareness of the risks associated with the dissemination of potentially harmful information. FREE trial versions at www.sherpasoftware.com
  • 2. Solutions for Email Storage, Policy Enforcement and Search & Discovery Managing PST Content Comply with Legal and Internal Information Requirements PST content must be controlled and easily accessible. When Sherpa software permits rapid compliance with discovery critical information is stored locally on desktop or laptop com- orders, regulatory information requests, internal informa- puters, or scattered around your network, finding PST files tion requests and other demands for information. This is and collecting information can be a difficult and time- critical, since compliance, particularly with regulatory re- consuming task. Additionally, enforcing archiving, retention quests, often requires rapid turnaround. and deletion policies are much more difficult when data stores are widely dispersed and not centrally accessible to IT staff. Delete Unnecessary Information Sherpa’s products provide content PST discovery, migration and management for desktop and network PST files by allow- Sherpa tools enforce the deletion of both personal and non- ing administrators to create flexible rules that monitor the corporate email, thereby allowing shorter backup windows, email infrastructure and automatically archive and enforce saving valuable storage space and removing potentially dam- corporate policies. Organizations can easily locate, access aging content. Given that these types of email do not contain and centrally manage local and network PST files while en- business records, deleting them is an important step in maxi- forcing policies, performing data archiving, deleting outdated mizing the value of storage. information, compacting PSTs and generating reports. Representative Sherpa Software Enterprise Customers About Sherpa Software Sherpa Software provides award-winning software specifically designed to address E-discovery, email and PST management, archiving and compliance requirements for Microsoft Exchange and Lotus Notes environments. Sherpa’s products are designed to streamline administrative processes while offering flexible management architectures and reasonable pricing models to com- panies of any size. With products that address compliance, legal liability, storage and content management, we have allowed our clients to reduce costs, minimize administration time, mitigate liabilities and secure information. We have earned a solid reputation as a leading software provider offering unparalleled customer service and support. We pride ourselves on the close relationships we share with our customers and work hard to be responsive to their needs. www.sherpasoftware.com