
eDJ Summary
eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed
briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request
that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed:
Over 6 months ago.
Strength
Topic: Management-Project Workflow Date: 2013-01-09 23:38:35 Premium Members OnlyThis eDJ Note is limited to Premium Members
Strength
Topic: DESCRIPTION Date: 2013-01-09 23:37:04 Premium Members OnlyThis eDJ Note is limited to Premium Members
Delivery Method:
- Method-Software/Inhouse
- Method-Cloud/Hosted/SaaS
Markets:
- Market-Corporate Enterprise
- Market-Government
- Market-Provider
- Market-International
Architecture:
- System-Chain of Custody
- System-Disposal Certification
- System-Audit Log
- Report-Customizable
- System-Security Roles
- System-Administration-Remote
- Architecture-Server-Virtual
- System-Scheduled Tasks
- System-Alerts
- System-Customizable GUI
- Architecture-Server-Enterprise Client
- Architecture-Server-Linux
- Architecture-Server-Enterprise Web
- Architecture-Server-Saas Hosted
- Architecture-Cloud
- Architecture-64-bit Compatible
- Architecture-API-Open
- Architecture-Open Source Components
- Architecture-Mobile App Software
- Architecture-Distributed
- Architecture-Windows Server
- Architecture-GUI-Web
- System-Print
- System-Print-Local
- System-GUI-Multilingual
- System-Integration-Enterprise Systems
- System-Questionnaire
- System-Track-Activity
- System-Multimatter
- System-Templates
- System-Alerts-Automated
General Coverage:
- General-Information Governance
- General-Identification Investigation
- General-Preservation Holds
- General-Collection Search
- General-Processing ECA
- General-Review
- General-Analysis
- General-Production
Manage:
- Management-Incident Response
- Management-Project Workflow
- Management-Review-Team
- Management-Case Collaboration and Contacts
- Management-Usage Cost
- Management-Policy - Privacy
- Management-Decision Tracking
- Management-Quality Control-Automated
- Management-Interviews
- Management-Plan and Budgeting
- Management-Identification
- Management-Documents
Information Governance:
- Management - Policy - Retention
- IG-Classification
Analyze:
- Identify-Data Map
- Identify-User Map
- Analysis-ESI Sampling
- Analysis-Domain
- Analysis-Chronological
- Analysis-Performance Metrics
- Report-Forecasting Metrics
- Analysis-Near Duplicate-OCR
- Analysis-Custodian Identity
- Identify-Data Map-Dynamic
- Analysis-Visualization
- Analysis-Dashboard
Preserve:
- Preserve-Legal Hold Notices
- Preserve-ESI Preservation Repository
- Preserve-In Place-Non Rights Based
- Preserve-Stealth Hold Collection
- Preserve-Legal Hold Notifications - Iterative
- Preserve-Legal Hold Notices-Aggregate Reminders
Collect:
- Collection-Forensically Sound Copy
- Collection-Custodian Self
- Identify-Stealth Investigation
- Collection-Enterprise ESI
- Collection-Incremental
- Collection-Remote
- Collection-Local
Search:
- Search-Indexed
- Search-Crawl
- Search-Concept
- Search-Network Enterprise
- Search-Fuzzy Logic
- Search-Foreign Language
- Search-Regular Expression
- Search-Facet Navigation
- Search-Synonym Expansion
- Report-Hit Report
- Search-Stemming
- Search-Saved Queries
- Search-Proximity
- Search-Boolean
- Search-Federated Sources
- Search-Thesaurus
- Search-Index-Weighted
- Search-Wildcard
- Search-Pattern Expansion
- Search-Natural Language
Purchase Method:
- Enterprise License ($ per seat)
- Subscription ($ per Year)
- Appliance ($ per Appliance)
Process:
- Process-Inventory
- Process-Decryption
- Process-Password Removal
- Process-Non-text File Detection
- Process-Metadata Extraction
- Process-File Type Identification
- Process-Scanning
- Process-TIFF Image Conversion
- Process-Text Extraction
- Process-OCR
- Process-Load Files
- Process-Exception Resolution
- Process-Deduplication-Hash
- Process-Communication De-Duplication
- Process-De-NIST Culling
- Process-Culling-Metadata
- Process-Cull-Rules
- Process-Content Flagging Rules
- Process-Near Duplicate ESI
- Process-Deduplication-Email Thread
- Process-Foreign Language Identification
- Process-Custom Hash Filter
Review:
- Review-Images
- Review-Native ESI
- Review-Redact Images
- Review-Redact Native ESI
- Review-Secured Subset
- Review-Remote
- Review-TAR Conceptual
- Review-Annotations
- Review-Privilege Log
- Review-Dynamic Folders
- Review-Parallel
- Review-Automated review management
- Review-TAR Predictive
- Review-Tiff on the Fly
- Review-TAR-Clustered
- Review-Metadata Redaction
- Review-Annotations-Highlighting
Produce:
- Produce-Image-Numbered
- Produce-Native ESI
- Produce-Multiple Party
- Produce-Repopulate Duplicates
- Produce-Load File-Delimited
- Produce-Evidence Encryption
- Produce-Cloud Delivery
- Produce-Text-Redacted
- Produce-Secure FTP
ESI Sources:
- ESI-Audio
- ESI-Backup Systems
- ESI-Communication
- ESI-Communication-Exchange and PST
- ESI-Communication-Freemail
- ESI-Communication-Lotus Domino
- ESI-Container Files
- ESI-Content Management
- ESI-Customer Relationship Management
- ESI-Flash Drives-Memory Cards
- ESI-Forensic Images
- ESI-Graphics
- ESI-Graphics-PDF
- ESI-Graphics-TIFF
- ESI-Hard Drives
- ESI-Markup Language Files
- ESI-Mobile Devices
- ESI-Mobile Devices-Blackberry
- ESI-Mobile Devices-iPad
- ESI-Mobile Devices-iPhone
- ESI-Office Files
- ESI-Office Files-2007+ format
- ESI-Optical Media
- ESI-Database
- ESI-Structured Applications
- ESI-Video
- ESI-Cloud
- ESI-Cloud-Social Media
- ESI-Content Management-Sharepoint
- ESI-Network Servers
- ESI-Network Storage
- ESI-Personal Computers
- ESI-Personal Computers-Apple Mac
- ESI-Mobile Devices-Android
- ESI-3rd Party Hosted
- ESI-Cloud-Communications
- ESI-Cloud-Content Management