
eDJ Summary
eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed
briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request
that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed:
Over 6 months ago.
Delivery Method:
- Method-Software/Inhouse
- Method-Cloud/Hosted/SaaS
Markets:
- Market-Corporate Enterprise
- Market-Law Firm
- Market-Single User
- Market-Provider
- Market-Small Mid Sized Business
Architecture:
- System-Chain of Custody
- System-Print-Bulk
- System-Disposal Certification
- System-Audit Log
- Report-Customizable
- System-Security Roles
- System-Administration-Remote
- Architecture-Server-Virtual
- Architecture-Server-Enterprise Client
- Architecture-Server-Enterprise Web
- Architecture-Server-Saas Hosted
- Architecture-64-bit Compatible
- Architecture-API-Open
- Architecture-Distributed
- Architecture-Windows Server
- System-Processed ESI Required
General Coverage:
- General-Analysis
Manage:
- Management-Exhibits
- Management-Transcripts
- Management-Review-Team
- Management-Policy - Privacy
Information Governance:
- IG-Classification
Analyze:
- Analysis-ESI Sampling
- Analysis-Linguistic
- Analysis-Domain
- Analysis-Social Networking
- Analysis-Chronological
- Analysis-Performance Metrics
- Analysis-Near Duplicate-OCR
- Analysis-Visualization
- Analysis-Conceptual
- Analysis-Similarity
- Analysis-Cluster-Soft
- Analysis-Context
- Process-Autocode-Subjective
- Analysis-Machine Learning
Search:
- Search-Indexed
- Search-Concept
- Search-Fuzzy Logic
- Search-Foreign Language
- Search-Regular Expression
- Search-Facet Navigation
- Search-Synonym Expansion
- Search-Stemming
- Search-Proximity
- Search-Boolean
- Search-Wildcard
Purchase Method:
- Enterprise License ($ per seat)
- Subscription ($ per Year)
- Volume Pricing ($ per GB)
- Desktop License ($/computer)
Process:
- Process-Password Removal
- Process-Non-text File Detection
- Process-Metadata Extraction
- Process-File Type Identification
- Process-TIFF Image Conversion
- Process-OCR
- Process-Autocode-Objective
- Process-Load Files
- Process-Exception Resolution
- Process-Deduplication-Hash
- Process-Communication De-Duplication
- Process-De-NIST Culling
- Process-Culling-Metadata
- Process-Cull-Rules
- Process-Content Flagging Rules
- Process-Near Duplicate ESI
- Process-Deduplication-Email Thread
- Process-Foreign Language Identification
Review:
- Review-Images
- Review-Native ESI
- Review-Redact Images
- Review-Auto Redaction
- Review-Secured Subset
- Review-Remote
- Review-TAR Conceptual
- Review-Annotations
- Review-Conditional Tagging
- Review-Privilege Log
- Review-Dynamic Folders
- Review-Parallel
- Review-TAR Predictive
- Review-TAR-Clustered
Produce:
- Produce-Image-Numbered
- Produce-Native ESI
- Produce-Multiple Party
- Produce-Repopulate Duplicates
- Produce-Load File-Delimited