
AD eDiscovery by D4
URL: http://www.d4discovery.com/services-solutions/technology-software/ Request More InfoeDJ Summary
eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed
briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request
that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed:
Over 6 months ago.
Delivery Method:
- Method-Software/Inhouse
Markets:
- Market-Corporate Enterprise
Architecture:
- System-Chain of Custody
- System-Audit Log
- Report-Customizable
- System-Security Roles
- System-Administration-Remote
- Architecture-Server-Virtual
- System-Scheduled Tasks
- System-Alerts
- System-Customizable GUI
- Architecture-Server-Enterprise Client
- Architecture-Server-Enterprise Web
- Architecture-64-bit Compatible
- Architecture-Windows Server
General Coverage:
- General-Preservation Holds
- General-Collection Search
- General-Processing ECA
- General-Review
- General-Production
Manage:
- Management-Incident Response
- Management-Project Workflow
- Management-Review-Team
Analyze:
- Identify-Data Map
- Identify-User Map
- Analysis-ESI Sampling
- Analysis-Domain
- Analysis-Social Networking
- Analysis-Chronological
- Analysis-Skin Tone
- Analysis-Performance Metrics
- Report-Forecasting Metrics
- Identify-Data Map-Dynamic
Preserve:
- Preserve-Legal Hold Notices
- Preserve-ESI Preservation Repository
- Preserve-In Place-Non Rights Based
- Preserve-Stealth Hold Collection
- Preserve-Legal Hold Notifications - Iterative
- Preserve-Legal Hold Notices-Aggregate Reminders
Collect:
- Collection-Forensically Sound Copy
- Collection-Forensic Image
- Identify-Stealth Investigation
- Collection-Enterprise ESI
- Collection-Incremental
- Collection-Remote
Search:
- Search-Indexed
- Search-Crawl
- Search-Network Enterprise
- Search-Fuzzy Logic
- Search-Foreign Language
- Search-Regular Expression
- Search-Facet Navigation
- Search-Synonym Expansion
- Report-Hit Report
- Search-Stemming
- Search-Saved Queries
- Search-Proximity
- Search-Boolean
- Search-Wildcard
Purchase Method:
- Enterprise License ($ per seat)
- Subscription ($ per Year)
Process:
- Process-Inventory
- Process-Legacy Media-Tape
- Process-Decryption
- Process-Password Removal
- Process-Non-text File Detection
- Process-Metadata Extraction
- Process-File Type Identification
- Process-TIFF Image Conversion
- Process-Text Extraction
- Process-OCR
- Process-Autocode-Objective
- Process-Load Files
- Process-Exception Resolution
- Process-Deduplication-Hash
- Process-Communication De-Duplication
- Process-De-NIST Culling
- Process-Culling-Metadata
- Process-Cull-Rules
- Process-Content Flagging Rules
- Process-Deduplication-Email Thread
- Process-Custom Hash Filter
- Process-Hidden Text Detection
Review:
- Review-Images
- Review-Native ESI
- Review-Redact Images
- Review-Secured Subset
- Review-Remote
- Review-Annotations
- Review-Privilege Log
- Review-Dynamic Folders
- Review-Parallel
- Review-Tiff on the Fly
Produce:
- Produce-Image-Numbered
- Produce-Native ESI
- Produce-Multiple Party
- Produce-Repopulate Duplicates
- Produce-Load File-Delimited
- Produce-Evidence Encryption
ESI Sources:
- ESI-Communication
- ESI-Communication-Exchange and PST
- ESI-Communication-Freemail
- ESI-Container Files
- ESI-Flash Drives-Memory Cards
- ESI-Forensic Images
- ESI-Hard Drives
- ESI-Office Files
- ESI-Office Files-2007+ format
- ESI-Residual Data
- ESI-Cloud
- ESI-Content Management-Sharepoint
- ESI-Network Servers
- ESI-Network Storage
- ESI-Personal Computers
- ESI-Cloud-Communications
- ESI-Cloud-Content Management