
eDJ Summary
eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed
briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request
that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed:
Over 6 months ago.
Challenge
Topic: DESCRIPTION Date: 2013-01-10 13:28:12 Premium Members OnlyThis eDJ Note is limited to Premium Members
Challenge
Topic: DESCRIPTION Date: 2013-01-10 13:27:42 Premium Members OnlyThis eDJ Note is limited to Premium Members
Challenge
Topic: Processing-ECA Date: 2013-01-10 13:26:50 Premium Members OnlyThis eDJ Note is limited to Premium Members
Strength
Topic: Collection-Forensic Image Date: 2013-01-10 13:25:35 Premium Members OnlyThis eDJ Note is limited to Premium Members
Delivery Method:
- Method-Software/Inhouse
Markets:
- Market-Corporate Enterprise
Architecture:
- System-Chain of Custody
- System-Audit Log
- Report-Customizable
- System-Security Roles
- Architecture-Server-Virtual
- System-Scheduled Tasks
- Architecture-Server-Enterprise Client
- Architecture-Server-Enterprise Web
- Architecture-64-bit Compatible
- Architecture-Distributed
- Architecture-Windows Server
- Architecture-Servlet Plugin Required
- System-Multimatter
Manage:
- Management-Incident Response
- Management-Review-Team
Analyze:
- Identify-Data Map
- Identify-User Map
- Identify-Organization Map
- Analysis-ESI Sampling
- Analysis-Social Networking
- Analysis-Chronological
Preserve:
- Preserve-Legal Hold Notices
- Preserve-ESI Preservation Repository
Collect:
- Collection-Forensically Sound Copy
- Collection-Forensic Image
- Identify-Stealth Investigation
- Collection-Enterprise ESI
- Collection-Remote
Search:
- Search-Indexed
- Search-Crawl
- Search-Network Enterprise
- Search-Foreign Language
- Search-Regular Expression
- Search-Stemming
Purchase Method:
- Enterprise License ($ per seat)
Process:
- Process-Inventory
- Process-Decryption
- Process-Password Removal
- Process-Non-text File Detection
- Process-Metadata Extraction
- Process-File Type Identification
- Process-Text Extraction
- Process-Load Files
- Process-Exception Resolution
- Process-Deduplication-Hash
- Process-Communication De-Duplication
- Process-De-NIST Culling
- Process-Culling-Metadata
- Process-Cull-Rules
- Process-Deduplication-Email Thread
- Process-Hidden Text Detection
Review:
- Review-Native ESI
- Review-Secured Subset
- Review-Annotations
- Review-Conditional Tagging
Produce:
- Produce-Image-Numbered
- Produce-Native ESI
- Produce-Repopulate Duplicates
- Produce-Load File-Delimited
ESI Sources:
- ESI-Communication
- ESI-Communication-Exchange and PST
- ESI-Communication-Freemail
- ESI-Container Files
- ESI-Encoding
- ESI-Flash Drives-Memory Cards
- ESI-Floppy Disks-Other Legacy Formats
- ESI-Forensic Images
- ESI-Hard Drives
- ESI-Mobile Devices
- ESI-Mobile Devices-Blackberry
- ESI-Mobile Devices-iPad
- ESI-Mobile Devices-iPhone
- ESI-Office Files
- ESI-Office Files-2007+ format
- ESI-Optical Media
- ESI-Residual Data
- ESI-Cloud
- ESI-Cloud-Social Media
- ESI-Content Management-Sharepoint
- ESI-Network Servers
- ESI-Network Storage
- ESI-Personal Computers
- ESI-Mobile Devices-Android
- ESI-Cloud-Communications
- ESI-Cloud-Content Management