
eDJ Summary
eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed
briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request
that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed:
Over 6 months ago.
Summary
Topic: Process-Load Files Date: 2013-11-06 12:15:36 Premium Members OnlyThis eDJ Note is limited to Premium Members
Strength
Topic: Review-TAR Predictive Date: 2013-09-25 18:15:51 Premium Members OnlyThis eDJ Note is limited to Premium Members
Delivery Method:
- Method-Software/Inhouse
- Method-Cloud/Hosted/SaaS
Markets:
- Market-Corporate Enterprise
- Market-Law Firm
- Market-Government
- Market-Single User
- Market-Provider
- Market-International
- Market-Small Mid Sized Business
Architecture:
- System-Chain of Custody
- System-Print-Bulk
- System-Disposal Certification
- System-Audit Log
- System-Security Roles
- System-Customizable GUI
General Coverage:
- General-Information Governance
- General-Identification Investigation
- General-Collection Search
- General-Processing ECA
- General-Review
- General-Analysis
- General-Production
Manage:
- Management-Review-Team
- Management-Quality Control
- Management-Quality Control-Metrics Reporting
- Management-Plan and Budgeting
- Management-Identification
Analyze:
- Identify-Data Map
- Identify-User Map
- Analysis-ESI Sampling
- Analysis-Domain
- Analysis-Social Networking
- Analysis-Chronological
- Analysis-Performance Metrics
- Report-Forecasting Metrics
- Analysis-Near Duplicate-OCR
- Identify-Data Map-Dynamic
Collect:
- Collection-Forensically Sound Copy
- Collection-Custodian Self
- Collection-Enterprise ESI
- Collection-Incremental
- Collection-Local
Search:
- Search-Indexed
- Search-Concept
- Search-Fuzzy Logic
- Search-Foreign Language
- Search-Synonym Expansion
- Report-Hit Report
- Search-Stemming
- Search-Saved Queries
- Search-Proximity
- Search-Boolean
Process:
- Process-Inventory
- Process-Legacy Media-Tape
- Process-Decryption
- Process-Password Removal
- Process-Non-text File Detection
- Process-Metadata Extraction
- Process-File Type Identification
- Process-Scanning
- Process-TIFF Image Conversion
- Process-Text Extraction
- Process-OCR
- Process-Autocode-Objective
- Process-Load Files
- Process-Exception Resolution
- Process-Deduplication-Hash
- Process-Communication De-Duplication
- Process-De-NIST Culling
- Process-Culling-Metadata
- Process-Cull-Rules
- Process-Content Flagging Rules
- Process-Near Duplicate ESI
- Process-Deduplication-Email Thread
- Process-Foreign Language Identification
- Process-OCR-Handwriting
Review:
- Review-Images
- Review-Native ESI
- Review-Redact Images
- Review-Redact Native ESI
- Review-Secured Subset
- Review-Remote
- Review-TAR Conceptual
- Review-Annotations
- Review-Conditional Tagging
- Review-Parallel
- Review-Automated review management
- Review-TAR Predictive
- Review-Tiff on the Fly
- Review-TAR-Clustered
- Review-Mobile-Offline
Produce:
- Produce-Image-Numbered
- Produce-Native ESI
- Produce-Multiple Party
- Produce-Repopulate Duplicates
- Produce-Load File-Delimited
- Produce-Evidence Encryption
ESI Sources:
- ESI-Backup Systems
- ESI-Backup-Tapes
- ESI-Communication-Lotus Domino
- ESI-Flash Drives-Memory Cards
- ESI-Forensic Images
- ESI-Mobile Devices
- ESI-Mobile Devices-Blackberry
- ESI-Mobile Devices-iPad
- ESI-Mobile Devices-iPhone
- ESI-Residual Data
- ESI-Mobile Devices-Android