Access:
VISITOR (not logged in)
Sign In or
Feedback

eDJ Summary

eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed: Over 6 months ago.

Request More Information

*By submitting this you will give owner access to the email address on file with eDJ Tech Matrix.

Delivery Method:

  • Method-Software/Inhouse

Markets:

  • Market-Corporate Enterprise
  • Market-Law Firm
  • Market-Government
  • Market-Single User
  • Market-Provider
  • Market-International
  • Market-Small Mid Sized Business

Architecture:

  • System-Chain of Custody
  • System-Audit Log
  • Report-Customizable
  • System-Security Roles
  • System-Administration-Remote
  • System-Scheduled Tasks
  • System-Customizable GUI
  • Architecture-Server-Enterprise Client
  • Architecture-Server-Linux
  • Architecture-Server-Saas Hosted
  • Architecture-Cloud
  • Architecture-No OEM Components
  • Architecture-Distributed
  • Architecture-GUI-Web

General Coverage:

  • General-Information Governance
  • General-Identification Investigation
  • General-Preservation Holds
  • General-Collection Search
  • General-Processing ECA
  • General-Analysis

Manage:

  • Management-Destruction

Information Governance:

  • IG-Archiving
  • Management - Policy - Retention

Analyze:

  • Analysis-Domain
  • Analysis-Chronological
  • Analysis-Custodian Identity

Preserve:

  • Preserve-ESI Preservation Repository

Collect:

  • Collection-Forensically Sound Copy
  • Collection-Forensic Image
  • Collection-Custodian Self
  • Collection-Enterprise ESI
  • Collection-Incremental
  • Collection-Remote
  • Collection-Local

Search:

  • Search-Indexed
  • Search-Network Enterprise
  • Search-Facet Navigation
  • Search-Synonym Expansion
  • Report-Hit Report
  • Search-Stemming
  • Search-Saved Queries
  • Search-Proximity
  • Search-Boolean
  • Search-Index-Weighted
  • Search-Wildcard
  • Search-Pattern Expansion

Purchase Method:

  • Subscription ($ per Year)
  • Volume Pricing ($ per GB)
  • Appliance ($ per Appliance)
  • Item Pricing ($ per doc)
  • Volume Output Pricing ($ per GB)
  • Time Billing ($/hour)
  • Per Site Licensing
  • User License-$ per User

Process:

  • Process-Inventory
  • Process-Legacy Media-Tape
  • Process-Non-text File Detection
  • Process-Metadata Extraction
  • Process-File Type Identification
  • Process-Text Extraction
  • Process-OCR
  • Process-Load Files
  • Process-Exception Resolution
  • Process-Deduplication-Hash
  • Process-Communication De-Duplication
  • Process-De-NIST Culling
  • Process-Culling-Metadata
  • Process-Cull-Rules
  • Process-Content Flagging Rules
  • Process-Custom Hash Filter

Review:

  • Review-Images
  • Review-Native ESI
  • Review-Secured Subset
  • Review-Remote
  • Review-Dynamic Folders

Produce:

  • Produce-Native ESI
  • Produce-Repopulate Duplicates
  • Produce-Load File-Delimited

ESI Sources:

  • ESI-Audio
  • ESI-Audio-Voicemail
  • ESI-Backup Systems
  • ESI-Backup-Tapes
  • ESI-Communication-Exchange and PST
  • ESI-Communication-Instant Messages
  • ESI-Communication-Lotus Domino
  • ESI-Container Files
  • ESI-Flash Drives-Memory Cards
  • ESI-Floppy Disks-Other Legacy Formats
  • ESI-Forensic Images
  • ESI-Graphics
  • ESI-Graphics-CAD
  • ESI-Graphics-PDF
  • ESI-Graphics-TIFF
  • ESI-Hard Drives
  • ESI-Office Files
  • ESI-Office Files-2007+ format
  • ESI-Optical Media
  • ESI-Residual Data
  • ESI-Database
  • ESI-Structured Applications
  • ESI-System Data
  • ESI-Video
  • ESI-Video-Analog
  • ESI-Content Management-Sharepoint
  • ESI-Network Servers
  • ESI-Network Storage
  • ESI-Personal Computers
  • ESI-Personal Computers-Apple Mac

This offering is provided by

Partners and Resellers

Reviews, News, and Mentions

Loading...