Access:
VISITOR (not logged in)
Sign In or
Feedback

eDJ Summary

eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed: In the last 6 months.

Request More Information

*By submitting this you will give owner access to the email address on file with eDJ Tech Matrix.

Delivery Method:

  • Method-Software/Inhouse

Markets:

  • Market-Small Mid Sized Business

Architecture:

  • System-Chain of Custody
  • System-Audit Log
  • Report-Customizable
  • System-Security Roles

Analyze:

  • Identify-Data Map
  • Identify-User Map
  • Identify-Organization Map
  • Analysis-ESI Sampling
  • Analysis-Domain
  • Analysis-Social Networking
  • Analysis-Chronological
  • Analysis-Custodian Identity
  • Identify-Data Map-Dynamic
  • Analysis-Visualization
  • Analysis-GPS Mapping
  • Analysis-Dashboard
  • Analysis-Similarity
  • Analysis-Cluster-Soft
  • Analysis-Context
  • Analysis-Profile-ESI
  • Analysis-Pattern-Time

Collect:

  • Collection-Forensically Sound Copy
  • Collection-Forensic Image
  • Collection-Custodian Self
  • Collection-Enterprise ESI

Search:

  • Search-Indexed
  • Search-Network Enterprise
  • Search-Foreign Language
  • Search-Regular Expression
  • Search-Facet Navigation
  • Search-Synonym Expansion
  • Report-Hit Report
  • Search-Saved Queries
  • Search-Boolean
  • Search-Wildcard

Purchase Method:

  • Online Purchase

Process:

  • Process-Inventory
  • Process-Password Removal
  • Process-Non-text File Detection
  • Process-Metadata Extraction
  • Process-File Type Identification
  • Process-Scanning
  • Process-TIFF Image Conversion
  • Process-Text Extraction
  • Process-OCR
  • Process-Load Files
  • Process-Exception Resolution
  • Process-Deduplication-Hash
  • Process-De-NIST Culling
  • Process-Culling-Metadata
  • Process-Cull-Rules
  • Process-Content Flagging Rules
  • Process-Near Duplicate ESI
  • Process-Deduplication-Email Thread
  • Process-Custom Hash Filter
  • Process-Hidden Text Detection

Review:

  • Review-Images
  • Review-Native ESI
  • Review-Redact Images
  • Review-Redact Native ESI
  • Review-Secured Subset
  • Review-Conditional Tagging
  • Review-Privilege Log
  • Review-Tiff on the Fly

Produce:

  • Produce-Native ESI
  • Produce-Multiple Party
  • Produce-Load File-Delimited
  • Produce-Evidence Encryption

ESI Sources:

  • ESI-Forensic Images
  • ESI-Mobile Devices
  • ESI-Mobile Devices-Blackberry
  • ESI-Mobile Devices-iPad
  • ESI-Mobile Devices-iPhone
  • ESI-Residual Data
  • ESI-Cloud
  • ESI-Cloud-Social Media
  • ESI-Content Management-Sharepoint
  • ESI-Mobile Devices-Android
  • ESI-Cloud-Communications

This offering is provided by

Partners and Resellers

Reviews, News, and Mentions

Loading...