Access:
VISITOR (not logged in)
Sign In or
Feedback

eDJ Summary

eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed: Over 6 months ago.

Request More Information

*By submitting this you will give owner access to the email address on file with eDJ Tech Matrix.

Delivery Method:

  • Method-Software/Inhouse

Markets:

  • Market-Corporate Enterprise
  • Market-Government
  • Market-Provider

Architecture:

  • System-Chain of Custody
  • System-Audit Log
  • Architecture-Desktop Software
  • Architecture-Server-Enterprise Client
  • Architecture-64-bit Compatible
  • Architecture-API-Open
  • Architecture-Distributed
  • Architecture-Windows Server
  • Architecture-GUI-Web
  • Architecture-Desktop-Mac OS

General Coverage:

  • General-Identification Investigation
  • General-Collection Search

Preserve:

  • Preserve-Stealth Hold Collection

Collect:

  • Collection-Forensically Sound Copy
  • Collection-Forensic Image
  • Collection-Enterprise ESI
  • Collection-Remote

Purchase Method:

  • Enterprise License ($ per seat)
  • Subscription ($ per Year)
  • Published List Pricing

Produce:

  • Produce-Evidence Encryption
  • Produce-Media

ESI Sources:

  • ESI-Communication
  • ESI-Container Files
  • ESI-Forensic Images
  • ESI-Hard Drives
  • ESI-Residual Data
  • ESI-Cloud
  • ESI-Network Storage
  • ESI-Personal Computers
  • ESI-Personal Computers-Apple Mac

This offering is provided by

Partners and Resellers

Reviews, News, and Mentions

Loading...