
eDJ Summary
eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed
briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request
that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed:
Over 6 months ago.
Opportunity
Topic: General-Preservation Holds Date: 2013-11-12 16:45:29 Premium Members OnlyThis eDJ Note is limited to Premium Members
Opportunity
Topic: DESCRIPTION Date: 2013-11-12 16:44:53 Premium Members OnlyThis eDJ Note is limited to Premium Members
Technical
Topic: ESI-Audio Date: 2013-11-12 16:47:09 Premium Members OnlyThis eDJ Note is limited to Premium Members
Threat
Topic: Method-Software/Inhouse Date: 2013-01-07 16:16:55 Premium Members OnlyThis eDJ Note is limited to Premium Members
Delivery Method:
- Method-Software/Inhouse
Markets:
- Market-Corporate Enterprise
- Market-Government
- Market-Small Mid Sized Business
Architecture:
- System-Chain of Custody
- System-Print-Bulk
- System-Audit Log
- Report-Customizable
- Architecture-Server-Virtual
- System-Scheduled Tasks
- Architecture-Server-Enterprise Client
- Architecture-64-bit Compatible
General Coverage:
- General-Preservation Holds
- General-Processing ECA
- General-Review
- General-Analysis
Manage:
- Management-Incident Response
- Management-Project Workflow
- Management-Review-Team
- Management-Policy - Privacy
- Management-Destruction
- Management-Policy
- Management-Policy-International
Information Governance:
- IG-Archiving
- Management - Policy - Retention
- IG-Classification
- IG-Archiving-Rule Designation
Analyze:
- Identify-User Map
- Analysis-Linguistic
- Analysis-Social Networking
Preserve:
- Preserve-Legal Hold Notices
- Preserve-ESI Preservation Repository
- Preserve-In Place
- Preserve-Stealth Hold Collection
- Preserve-Legal Hold Notifications - Iterative
- Preserve-Legal Hold Notices-Aggregate Reminders
Collect:
- Collection-Forensically Sound Copy
- Identify-Stealth Investigation
- Collection-Enterprise ESI
- Collection-Incremental
Search:
- Search-Indexed
- Search-Concept
- Search-Network Enterprise
- Search-Fuzzy Logic
- Search-Foreign Language
- Search-Regular Expression
- Search-Facet Navigation
- Search-Synonym Expansion
- Report-Hit Report
- Search-Stemming
- Search-Saved Queries
- Search-Proximity
- Search-Boolean
- Search-Phonic
Purchase Method:
- Enterprise License ($ per seat)
- Subscription ($ per Year)
Process:
- Process-Decryption
- Process-Password Removal
- Process-Non-text File Detection
- Process-Metadata Extraction
- Process-File Type Identification
- Process-Scanning
- Process-TIFF Image Conversion
- Process-Text Extraction
- Process-OCR
- Process-Autocode-Objective
- Process-Load Files
- Process-Deduplication-Hash
- Process-Communication De-Duplication
- Process-De-NIST Culling
- Process-Culling-Metadata
- Process-Cull-Rules
- Process-Content Flagging Rules
- Process-Deduplication-Email Thread
- Process-Foreign Language Identification
Review:
- Review-Images
- Review-Native ESI
- Review-Redact Images
- Review-Auto Redaction
- Review-Secured Subset
- Review-Remote
- Review-Conditional Tagging
- Review-Dynamic Folders
- Review-Automated review management
- Review-TAR Predictive
- Review-Tiff on the Fly
Produce:
- Produce-Image-Numbered
- Produce-Native ESI
- Produce-Load File-Delimited
ESI Sources:
- ESI-Audio
- ESI-Audio-Voicemail
- ESI-Communication
- ESI-Communication-Exchange and PST
- ESI-Container Files
- ESI-Encoding
- ESI-Graphics-PDF
- ESI-Graphics-TIFF
- ESI-Office Files
- ESI-Office Files-2007+ format
- ESI-Video
- ESI-Cloud
- ESI-Network Storage
- ESI-Cloud-Communications