Access:
VISITOR (not logged in)
Sign In or
Feedback

Heureka Intelligence Platform

URL: http://www.heurekasoftware.com/ Request More Info

eDJ Summary

eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed: Over 6 months ago.

Request More Information

*By submitting this you will give owner access to the email address on file with eDJ Tech Matrix.

Differentiator

Topic: DESCRIPTION Date: 2013-09-16 12:15:18 Premium Members Only

This eDJ Note is limited to Premium Members

Login

Challenge

Topic: Review-TAR Conceptual Date: 2013-09-16 12:11:32

You must register and log in to read public eDJ Notes

Login

Summary

Topic: Review-TAR-Clustered Date: 2013-09-16 11:52:09

You must register and log in to read public eDJ Notes

Login

Summary

Topic: Market-Law Firm Date: 2013-09-16 11:50:35

Summary

Topic: Search-Indexed Date: 2013-09-16 11:49:36

You must register and log in to read public eDJ Notes

Login

Summary

Topic: Collection-Enterprise ESI Date: 2013-09-16 11:49:09

You must register and log in to read public eDJ Notes

Login

Delivery Method:

  • Method-Software/Inhouse
  • Method-Cloud/Hosted/SaaS

Markets:

  • Market-Corporate Enterprise
  • Market-Law Firm
  • Market-Government
  • Market-Provider
  • Market-International
  • Market-Small Mid Sized Business

Architecture:

  • System-Chain of Custody
  • System-Audit Log
  • Report-Customizable
  • System-Security Roles
  • System-Administration-Remote
  • Architecture-Server-Virtual
  • System-Scheduled Tasks
  • System-Alerts
  • Architecture-Desktop Software
  • Architecture-Server-Enterprise Client
  • Architecture-Server-Linux
  • Architecture-Server-Enterprise Web
  • Architecture-Server-Saas Hosted
  • Architecture-Cloud
  • Architecture-64-bit Compatible
  • Architecture-API-Open
  • Architecture-Open Source Components
  • Architecture-Distributed
  • Architecture-Windows Server
  • Architecture-Apple Server
  • Architecture-GUI-Web
  • System-Print
  • System-GUI-Multilingual
  • Architecture-Security-Physical
  • System-Processed ESI Required
  • Architecture-Desktop-Mac OS
  • System-Integration-Enterprise Systems
  • System-Track-Activity
  • System-Multimatter
  • System-Alerts-Automated

General Coverage:

  • General-Information Governance
  • General-Identification Investigation
  • General-Preservation Holds
  • General-Collection Search
  • General-Processing ECA
  • General-Review
  • General-Analysis
  • General-Production
  • General-Presentation

Manage:

  • Management-Incident Response
  • Management-Project Workflow
  • Management-Review-Team
  • Management-Policy - Privacy
  • Management-Quality Control-Automated
  • Management-Quality Control-Metrics Reporting
  • Management-Documents
  • Management-Policy
  • Management-Policy-International
  • Management-Infrastructure

Information Governance:

  • Management - Policy - Retention
  • IG-End Point Protection
  • IG-Classification
  • IG-Migration
  • IG-Archiving-Rule Designation

Analyze:

  • Identify-Data Map
  • Identify-User Map
  • Analysis-ESI Sampling
  • Analysis-Linguistic
  • Analysis-Domain
  • Analysis-Social Networking
  • Analysis-Chronological
  • Analysis-Near Duplicate-OCR
  • Analysis-Custodian Identity
  • Analysis-Visualization
  • Analysis-Image Categorization
  • Analysis-Dashboard
  • Analysis-Conceptual
  • Analysis-Similarity
  • Analysis-Cluster-Soft
  • Analysis-Context
  • Analysis-Event Map
  • Process-Autocode-Subjective
  • Analysis-Machine Learning
  • Analysis-Profile-ESI
  • Analysis-Pattern-Time

Preserve:

  • Preserve-Legal Hold Notices
  • Preserve-ESI Preservation Repository
  • Preserve-In Place
  • Preserve-In Place-Non Rights Based
  • Preserve-Stealth Hold Collection
  • Preserve-Legal Hold Notifications - Iterative

Collect:

  • Collection-Forensically Sound Copy
  • Identify-Stealth Investigation
  • Collection-Enterprise ESI
  • Collection-Incremental
  • Collection-Remote
  • Collection-Local

Search:

  • Search-Indexed
  • Search-Crawl
  • Search-Concept
  • Search-Network Enterprise
  • Search-Fuzzy Logic
  • Search-Foreign Language
  • Search-Regular Expression
  • Search-Facet Navigation
  • Search-Synonym Expansion
  • Report-Hit Report
  • Search-Stemming
  • Search-Saved Queries
  • Search-Proximity
  • Search-Boolean
  • Search-Federated Sources
  • Search-Index-Weighted
  • Search-Wildcard
  • Search-Pattern Expansion
  • Search-Natural Language

Purchase Method:

  • Enterprise License ($ per seat)
  • Subscription ($ per Year)

Process:

  • Process-Inventory
  • Process-Legacy Media-Tape
  • Process-Non-text File Detection
  • Process-Metadata Extraction
  • Process-File Type Identification
  • Process-TIFF Image Conversion
  • Process-Text Extraction
  • Process-Autocode-Objective
  • Process-Load Files
  • Process-Exception Resolution
  • Process-Deduplication-Hash
  • Process-Communication De-Duplication
  • Process-De-NIST Culling
  • Process-Culling-Metadata
  • Process-Cull-Rules
  • Process-Content Flagging Rules
  • Process-Near Duplicate ESI
  • Process-Deduplication-Email Thread
  • Process-Foreign Language Identification
  • Process-Custom Hash Filter

Produce:

  • Produce-Native ESI
  • Produce-Load File-Delimited
  • Produce-Cloud Delivery
  • Produce-Secure FTP

ESI Sources:

  • ESI-Audio
  • ESI-Backup-Tapes
  • ESI-Communication
  • ESI-Communication-Exchange and PST
  • ESI-Communication-Freemail
  • ESI-Communication-Lotus Domino
  • ESI-Communication-Novell Groupwise
  • ESI-Container Files
  • ESI-Encoding
  • ESI-Flash Drives-Memory Cards
  • ESI-Floppy Disks-Other Legacy Formats
  • ESI-Graphics
  • ESI-Graphics-CAD
  • ESI-Graphics-PDF
  • ESI-Graphics-TIFF
  • ESI-Hard Copy Documents
  • ESI-Hard Drives
  • ESI-Markup Language Files
  • ESI-Mobile Devices
  • ESI-Mobile Devices-iPad
  • ESI-Mobile Devices-iPhone
  • ESI-Office Files
  • ESI-Office Files-2007+ format
  • ESI-Optical Media
  • ESI-Residual Data
  • ESI-Source Code
  • ESI-System Data
  • ESI-Video
  • ESI-Cloud
  • ESI-Content Management-Sharepoint
  • ESI-Network Servers
  • ESI-Network Storage
  • ESI-Personal Computers
  • ESI-Personal Computers-Apple Mac
  • ESI-Mobile Devices-Android
  • ESI-3rd Party Hosted
  • ESI-Cloud-Communications

Differentiator

Topic: DESCRIPTION Date: 2013-09-16 12:15:18

VeDiscovery is moving into the pro-active investigative market by beta testing the ability for organizations to use the Ve Agent in stealth mode on employee's systems to alert higher-ups to potentially inappropriate content.

Add Feedback

Challenge

Topic: Review-TAR Conceptual Date: 2013-09-16 12:11:32

VeReview is integrated with CAAT but doesn't have a built-in predictive coding workflow. Currently, VeReview does not have automated review batch creation methods. Batches are created by searching document ID ranges and assigning items to batches, manually.

Add Feedback

Summary

Topic: Review-TAR-Clustered Date: 2013-09-16 11:52:09

VeReview uses CAAT

Add Feedback

Summary

Topic: Market-Law Firm Date: 2013-09-16 11:50:35

As of 201309 97% of VeD clients are law firms.

Add Feedback

Summary

Topic: Search-Indexed Date: 2013-09-16 11:49:36

dtSearch

Add Feedback

Summary

Topic: Collection-Enterprise ESI Date: 2013-09-16 11:49:09

Ve Agent - sends simple Legal Hold notification to custodian w/link to download agent software. Indexes local machine to enable various kinds of search in order to extract to VeDiscovery Cloud platform - straight into VeReview for immediate review by attorney or team.

Add Feedback

This offering is provided by

Partners and Resellers

Reviews, News, and Mentions

Loading...