Access:
VISITOR (not logged in)
Sign In or
Feedback

eDJ Summary

eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed: Over 6 months ago.

Request More Information

*By submitting this you will give owner access to the email address on file with eDJ Tech Matrix.

Strength

Topic: DESCRIPTION Date: 2013-01-10 21:23:03 Premium Members Only

This eDJ Note is limited to Premium Members

Login

Delivery Method:

  • Method-Cloud/Hosted/SaaS

Architecture:

  • System-Chain of Custody
  • System-Print-Bulk
  • System-Audit Log
  • System-Security Roles
  • System-Administration-Remote
  • System-Scheduled Tasks

General Coverage:

  • General-Processing ECA
  • General-Review

Manage:

  • Management-Incident Response
  • Management-Review-Team
  • Management-Usage Cost
  • Management-Decision Tracking

Analyze:

  • Identify-User Map
  • Analysis-ESI Sampling
  • Analysis-Social Networking
  • Analysis-Chronological
  • Analysis-Performance Metrics
  • Analysis-Near Duplicate-OCR
  • Analysis-Custodian Identity

Collect:

  • Collection-Forensically Sound Copy

Search:

  • Search-Indexed
  • Search-Concept
  • Search-Fuzzy Logic
  • Search-Foreign Language
  • Search-Regular Expression
  • Search-Facet Navigation
  • Report-Hit Report
  • Search-Stemming

Purchase Method:

  • Volume Pricing ($ per GB)

Process:

  • Process-Password Removal
  • Process-Non-text File Detection
  • Process-Metadata Extraction
  • Process-File Type Identification
  • Process-TIFF Image Conversion
  • Process-Text Extraction
  • Process-OCR
  • Process-Autocode-Objective
  • Process-Load Files
  • Process-Exception Resolution
  • Process-Deduplication-Hash
  • Process-Communication De-Duplication
  • Process-De-NIST Culling
  • Process-Cull-Rules
  • Process-Content Flagging Rules
  • Process-Near Duplicate ESI
  • Process-Deduplication-Email Thread
  • Process-Automatic Translation
  • Process-Foreign Language Identification
  • Process-Hidden Text Detection

Review:

  • Review-Images
  • Review-Native ESI
  • Review-Redact Images
  • Review-Secured Subset
  • Review-Remote
  • Review-TAR Conceptual
  • Review-Annotations
  • Review-Conditional Tagging
  • Review-Privilege Log
  • Review-Dynamic Folders
  • Review-Parallel
  • Review-Automated review management
  • Review-TAR Predictive
  • Review-Tiff on the Fly
  • Review-TAR-Clustered
  • Review-Document Comparison

Produce:

  • Produce-Image-Numbered
  • Produce-Native ESI
  • Produce-Multiple Party
  • Produce-Load File-Delimited
  • Produce-Evidence Encryption

Strength

Topic: DESCRIPTION Date: 2013-01-10 21:23:03

Offers both do-it-yourself eDiscovery and managed services

Add Feedback

This offering is provided by

Partners and Resellers

Reviews, News, and Mentions

Loading...