Access:
VISITOR (not logged in)
Sign In or
Feedback

eDJ Summary

eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed: Over 6 months ago.

Request More Information

*By submitting this you will give owner access to the email address on file with eDJ Tech Matrix.

Differentiator

Topic: System-Security Roles Date: 2014-04-07 11:43:51 Premium Members Only

This eDJ Note is limited to Premium Members

Login

Differentiator

Topic: DESCRIPTION Date: 2013-01-21 20:49:58

You must register and log in to read public eDJ Notes

Login

Challenge

Topic: DESCRIPTION Date: 2013-01-21 20:51:51 Premium Members Only

This eDJ Note is limited to Premium Members

Login

Delivery Method:

  • Method-Software/Inhouse

Markets:

  • Market-Government
  • Market-Provider
  • Market-Small Mid Sized Business

Architecture:

  • System-Security Roles
  • Architecture-Desktop Software
  • System-Templates

General Coverage:

  • General-Collection Search

Analyze:

  • Analysis-Chronological

Collect:

  • Collection-Forensically Sound Copy
  • Collection-Forensic Image
  • Collection-Local

Search:

  • Search-Indexed

Purchase Method:

  • Appliance ($ per Appliance)
  • Desktop License ($/computer)

Process:

  • Process-Password Removal
  • Process-Metadata Extraction

Review:

  • Review-Native ESI

Produce:

  • Produce-Native ESI

ESI Sources:

  • ESI-Mobile Devices
  • ESI-Mobile Devices-Blackberry
  • ESI-Mobile Devices-iPad
  • ESI-Mobile Devices-iPhone
  • ESI-Residual Data
  • ESI-Mobile Devices-Android

Differentiator

Topic: System-Security Roles Date: 2014-04-07 11:43:51

UFED version 3.0 includes granular security and user permission management to support many corporate and civil litigation usage scenarios that include privacy issues and the need to isolate personal from work content. These kinds of features demonstrate the evolution of criminal forensic tools to actual eDiscovery technology that can be integrated into realistic workflows.

Add Feedback

Differentiator

Topic: DESCRIPTION Date: 2013-01-21 20:49:58

The Cellebrite UFED device is heavily used by law enforcement and has received significant press for cell phone acquisitions on road side stops.

Add Feedback

Challenge

Topic: DESCRIPTION Date: 2013-01-21 20:51:51

The UFED user interface is designed to support law enforcement workflow and usage scenarios. Corporate buyers should test in real world collection and extraction scenarios to make sure that it is suitable for their typical discovery criteria.

Add Feedback

This offering is provided by

Partners and Resellers

Reviews, News, and Mentions

Loading...