eDJ Summary
eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed
briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request
that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed:
Over 6 months ago.
Delivery Method:
- Method-Software/Inhouse
Markets:
- Market-Small Mid Sized Business
Architecture:
- System-Chain of Custody
- System-Audit Log
- Report-Customizable
- System-Security Roles
Analyze:
- Identify-Data Map
- Identify-User Map
- Identify-Organization Map
- Analysis-ESI Sampling
- Analysis-Domain
- Analysis-Social Networking
- Analysis-Chronological
- Analysis-Custodian Identity
- Identify-Data Map-Dynamic
- Analysis-Visualization
- Analysis-GPS Mapping
- Analysis-Dashboard
- Analysis-Similarity
- Analysis-Cluster-Soft
- Analysis-Context
- Analysis-Profile-ESI
- Analysis-Pattern-Time
Collect:
- Collection-Forensically Sound Copy
- Collection-Forensic Image
- Collection-Custodian Self
- Collection-Enterprise ESI
Search:
- Search-Indexed
- Search-Network Enterprise
- Search-Foreign Language
- Search-Regular Expression
- Search-Facet Navigation
- Search-Synonym Expansion
- Report-Hit Report
- Search-Saved Queries
- Search-Boolean
- Search-Wildcard
Purchase Method:
- Online Purchase
Process:
- Process-Inventory
- Process-Password Removal
- Process-Non-text File Detection
- Process-Metadata Extraction
- Process-File Type Identification
- Process-Scanning
- Process-TIFF Image Conversion
- Process-Text Extraction
- Process-OCR
- Process-Load Files
- Process-Exception Resolution
- Process-Deduplication-Hash
- Process-De-NIST Culling
- Process-Culling-Metadata
- Process-Cull-Rules
- Process-Content Flagging Rules
- Process-Near Duplicate ESI
- Process-Deduplication-Email Thread
- Process-Custom Hash Filter
- Process-Hidden Text Detection
Review:
- Review-Images
- Review-Native ESI
- Review-Redact Images
- Review-Redact Native ESI
- Review-Secured Subset
- Review-Conditional Tagging
- Review-Privilege Log
- Review-Tiff on the Fly
Produce:
- Produce-Native ESI
- Produce-Multiple Party
- Produce-Load File-Delimited
- Produce-Evidence Encryption
ESI Sources:
- ESI-Forensic Images
- ESI-Mobile Devices
- ESI-Mobile Devices-Blackberry
- ESI-Mobile Devices-iPad
- ESI-Mobile Devices-iPhone
- ESI-Residual Data
- ESI-Cloud
- ESI-Cloud-Social Media
- ESI-Content Management-Sharepoint
- ESI-Mobile Devices-Android
- ESI-Cloud-Communications