FEATURES AND BENEFITS COMPARISON CHART
|
|
- Theresa Woods
- 5 years ago
- Views:
Transcription
1 Preserve. Collect. Filter. Forensically Sound Litigation Support Depending on your ESI scenario, we have you covered! Don t take a chance with drag and drop or any other unsound methods. Here is a comparison of our proven, industry leading, and easy to use Pinpoint Labs file collection and preservation software tools. FEATURES AND BENEFITS COMPARISON CHART SafeCopy 2 Desktop SafeCopy 2 Nomad SafeCopy 2 Server Harvester Portable Harvester Server Create and Deploy Remote Collections Across Multiple Clients and Networks X Keyword Filter MS Outlook PST s, loose files, attachments, and archives X X Dedupe, and Filter Multiple PST s - regenerate new PST s, or export to 8 individual message formats. X X Removes System Files Included In NSRL List (denisting) X X Filter by Header Signature Analysis X X Create Portable and Automated Collections (preconfigured work orders) X X Use For In-House Production Level Culling (denisting/deduping) and Onsite Collection Projects X X Scriptable Profiles and Collection Jobs For Increased Flexibility X X Easily Save and Reuse Job Settings X X Easily Transfer Licenses to Other Locations, Portable Drives, or Server (runs without installation on host computer) X X X X Captures Files With Paths Greater Than 255 Characters X X X X X Instantly Up and Running (No shipping delays for hardware or software) X X X X X Easily Resume (In Case of System Crash or Power Outage) X X X X X Process File List X X X X X Extensive Chain of Custody Report X X X X X 100% File Copy Verification X X X X X Compatible With All Electronic and Litigation Platforms X X X X X Select From Multiple Data Sources X X X X X Filter By Extension and Date Range X X X X X Preserves Metadata and Time Stamps X X X X X Great for Legal Holds X X X X X
2 One Click Collect - Harvester 2.0 Forensically Sound Copies One Click Collect Harvester 2.0 allows you to capture the files you need and cull them down at collection so you aren t burdened by clutter. Why pay to process unnecessary files if you don t have to? Now you can work more efficiently and save money in the process! Features: a Preserve Metadata and Timestamps a Capture Files with Paths Greater than 255 Characters a Create Extensive Chain of Custody Report a 100% File Copy Verification a Keyword Cull Loose Files, PST s, Archives, and Attachments a Select from Multiple Data Sources a Create Portable and Automated Collections a Script Profiles and Collection Jobs for Increased Flexibility a Activate and Deactivate the Software License to Distribute with Ease a Create and Deploy Remote Collections Across Multiple Clients and Networks a Dedupe and Filter Single or Multiple PSTs a Dedupe, DeNIST and Header / Signature Analysis One Click COLLECT With One Click Collect Harvester 2.0, we give you options, flexibility and savings. To learn more about One Click Collect Harvester 2.0 or to obtain the software, call or sales@pinpointlabs.com. You Can Have it Your Way by Saving Your Culled- Down PST Data into a Single PST, Multiple PSTs (One to One), or Other File Formats (msg, html, txt, etc.)
3 One Click Collect - Harvester 2.0 Forensically Sound Copies What People Are Saying About OCCH... One Click COLLECT by far the best value in ediscovery tools on the market. -Jim S. Fortune 500 Company Harvester from Pinpoint Labs is getting us in the door with clients. Knowing that Jon Rowe is the driving force behind the product and his experience in the litigation software field makes the decision a no brainer. Having access to the development team and customer service that treats you like you are their only client is very refreshing. And in today s world that is hard to find. - Clark Ross, Owner Relevant Data Technologies As Director of e-discovery at Spotts Fain, PC, I have had the opportunity to use what I consider to be one of the most productive pieces of forensic software on the market today SafeCopy. I am not only amazed at its functionality in conducting ESI collections, but also its affordability. In my opinion, there is no forensic collection tool that has a better value for the dollar. We have just upgraded to Harvester which has a denisting and deduplication functionality, as well as, key word culling, PST filtering and regeneration, automated job tickets, and header/signature analysis. Again, a tremendous value, priced far under forensic tools that run from $3,000 - $5,000. I do not know how you do it, Pinpoint Labs, but thank you. -Michael Yager, Directory of E-Discovery Spotts Fain The volume of network data required to be searched within tightly defined parameters for what we could extract led us to test several products from PinPoint Labs. Once we saw the flexibility and robust capacity of Harvester, the choice was obvious and quick. We have used Harvester on several large projects successfully and look forward to many more using this capable tool. -Jim Pollock, Certified Computer Examiner Eagle Technology Associates I was presented with the daunting task of processing 60 PST files (30 GB) at 8:00 am in preparation for depositions the same afternoon. The client provided eleven key words, two domain names and a date range. Utilizing OCCH I was able to cull down the paper equivalent of two million pages to a couple of hundred responsive s, completing the discovery in a couple of hours. Needless to say, the client was thrilled. Thanks for a very fine product. -Jason Park, Certified Computer Examiner Protegga To learn more about One Click Collect Harvester 2.0 or to obtain the software, call or sales@pinpointlabs.com
4 Pinpoint Labs White Paper 8246 Oddo Ciccle Murray, NE By Jon Rowe, President Certified Computer Examiner (CCE) Page 1
5 Contents Introduction 2 Problem Statement 2 Previous Options 3 One Click Collect Solution 3 Implementation 3 Summary 6 Introduction One Click Collect is a product family developed by Pinpoint Labs. It allows for the remote, automated, collection of relevant electronic files pursuant to a discovery request. Problem Statement Incomplete and undocumented electronic discovery collections occur every day. The result of mishandling these files can be costly to both the client and their legal counsel. During the course of fulfilling an electronically stored information (ESI) discovery request, corporations use software, and processes which do not fulfill the obligations required for a defensible collection. The results include but are not limited to: 1) Altered file timestamps and metadata 2) Incomplete collections due to files in long paths or files missed during software malfunctions 3) Undocumented processes 4) Missing Chain of Custody 5) User errors 6) Error logging 7) Lack of custodian source details 8) Job criteria used during collection 9) Incorrect batch or script files Normally, a discovery request is created and the corporate IT department or other client employee copies relevant files or directories to disc or USB drive. From the client s perspective, this is the least costly way to collect data. It can be, however, the most costly way in the long run. The integrity of files collected from corporate Page 2
6 Pinpoint Labs White Paper servers and client machines are in jeopardy because many electronic document collections are completed using tools which lack the ability to confirm results and properly document the processes. Client System Modifications Current collection efforts should include using applications and processes which preserve the native states on servers and individual client PC s. However, many file collection utilities require an installation on corporate systems, which can introduce multiple obstacles: Corporate IT policies may prevent installing new software without prior approval Transferring software licenses between systems may require purchasing multiple copies or contact the developer Collection software may not have all file dependencies on target computer File Collection software should ideally be portable and run without installation. The zero footprint software option preserves the native state of the servers and client machines. Previous Options Software utilities like Robocopy, Microsoft Windows Copy, and XXCopy are commonly used by corporate IT departments, computer forensic professionals, and litigation support technicians. When these applications are used for ESI collections the above issues are commonly encountered, potentially exposing the clients to sanctions, and other penalties. This is due to a lack of defensible standards, and tools. Advising clients about proper file collection methods must be considered from the beginning of each case. Using processes and applications which preserve and verify collected electronic files with minimal impact on client systems is critical. Without these, creating defensible and verifiable electronic discovery productions and evidence authentication is difficult, if not impossible. One Click Collect Solution As a result of these crippling issues, a new breed of ESI collection software was developed. One Click Collect from Pinpoint Labs works from preconfigured file requests created by users to ensure full control. This eliminates errors that are commonly associated with self collection. Additionally, files copied retain their file timestamps, metadata, hash verifies each file, and a chain of custody containing details for each file is created. If any problems are encountered during the process, a real-time alert is displayed as well as stored in a log file. Preserves File Stamps and Metadata Insuring collected files retain their modified, accessed, created (MAC) times and metadata is critical. Many copy or burning processes modify the source and target file time stamps and don t complete copies because they do not incorporate a hash or checksum verification process. One Click Collect not only preserves the file system time stamps, it also hash verifies each file Page 3
7 Pinpoint Labs White Paper and alerts users if there are any discrepancies. Files in Long Paths Files relevant to a document production commonly reside in paths greater than 255 characters. Most applications are unable to copy these files because Microsoft Windows is limited to seeing any files in long paths. Consequently the files are missed during collection and therefore not available for review. One Click Collect can locate files in paths up to 32,000 characters. Users can be confident when using One Click Collect that these relevant files will be identified copied, and a noted in the collection log. Instantly Up and Running Unlike other products One Click Collect doesn t require security dongles, and will install on the clients choice of media. Licenses may be immediately downloaded, and users can begin creating job files or running a collection. Portable or Network (Harvester License) One Click Collect Harvester can be used as either a portable or network license. This provides optimal flexibility and allows users to easily switch on-the-fly. Place your Harvester license on an external drive and collect from multiple computers today, and install it on network attached storage (NAS) tomorrow for scripted, remote network collections. Create and Deploy Remote Collections Using One Click Collect job tickets, you are in control of the collection from the very beginning of the project. Combining job tickets with the autostart and stealth options you can trigger collections across town or across the world. Compatibility Collected files are stored in their native format and immediately compatible with all electronic discovery processing, and review platforms. No additional conversion or forensic image mounting software is required. Share Licenses Everywhere One Click Collect licenses can be easily deactivated (checked in) and, immediately reactivated (checked out) on other media instantly. No need to ship hardware, cases or security keys. Reduce ESI Processing Costs One Click Collect Harvester incorporates a hash list filtering engine which allows users to denist system, applications, and duplicate files during collection or in house. This will considerably reduce processing and storage fees especially when using applications that charge per gigabyte fees. Pinpoint Labs has included it s highly optimized denisting engine from PG Pinpoint in One Click Collect - Harvester. Portable denisting is now a reality and can be easily fit on a USB flash drive! Implementation Installation One Click Collect products are a result of highly optimized code that requires very little space and resides in a single folder. Installing OCC is accomplished by Page 4
8 Pinpoint Labs White Paper unzipping the source files to the media of choice and registering the software. During an online activation the software contacts Pinpoint Labs servers to check out the requested license(s). When an internet connection is unavailable, offline activation can be completed by ing or calling a customer service representative with the serial number displayed. An activation key is provided to complete the registration. Portable Mode When One Click Collect Harvester or Onsite files are unzipped to USB devices or internal hard drives users will choose the portable option. This option registers the device to the media provided. The activated license will only work with the original target media. Network Mode One Click Collect Harvester (only) has the additional option of being installed in a shared (UNC path) location. This option allows access to OCC from any system mapped to the shared location. No local installation is required on the target computers. OCCH, and individual job files can be launched from a command line or scripts. Customers routinely use OCCH to script collections on remote computers without physically being at the PC. In addition to using switches to launch stealth collections, other command line options can be set and activated on completion. For example, this option could be used to initiate notification to an distribution list or post job updates to litigation hold portals. Production denisting Although One Click Collect Harvester is most commonly viewed as a collection platform, it has an equally valuable use as a production level denisting tool. Several service bureaus have found that installing OCCH on a network drive provides the most affordable and powerful denisting, filtering platform available. The OCCH (unlimited) option provides an affordable denisting option because it is the only software that allows customers to initiate a filtering project across all systems on the network for the same cost. Transferring Licenses As previously mentioned OCC licenses can be deactivated and reissued to new devices and shared locations. Internet access is required to complete the process. One Click Collect Licenses One Click Collect Onsite - Preserve file time stamps and metadata - Automated collections - Filter by file headers - Automatically locate logical and mapped drives or target computer - Automatically creates target folders based on computer name, logged in user name, collection date One Click Collect Harvester (H3) Includes the above plus: - Starts with 3 concurrent licenses with option to add more - Scripting - Hash list filtering (denisting, deduping) Page 5
9 Pinpoint Labs White Paper - License works on portable device and network One Click Collect Harvester (Unlimited) Includes the above plus: - Unlimited network connections - Only counts as single portable license and commonly used only on network share One Click Collect - Publishing - Special large volume licensing option for One Click Collect Harvester or Onsite - Licensed by the month, or large quantity low per temp license rate Pinpoint Labs for active file collections because the jobs can be preconfigured, and the results are documented producing an automated and defensible collection. About Pinpoint Labs Pinpoint Labs was founded by Jon Rowe and James Beasley, who are Certified Computer Examiners (CCE) and member of The International Society of Forensic computer Examiners (ISFCE). Their experience includes more than 18 years of litigation support experience and over two decades in software development. Summary Many recognize that preserving, verifying, and documenting ESI collections not only confirms relevant files are acquired; it helps legal departments avoid spoliation and demonstrates to their client they are implementing best practices. As inside counsel, general counsel, and corporate IT departments learn more about litigation readiness, it becomes more important that their partnering legal departments keep abreast of the changes and are the ones leading the way. Being proactive and recommending the proper methods and tools for ESI collections (especially self collection) will ensure consistent results and provide a heads-up on any issues encountered. Many legal departments and service providers rely on One Click Collect from Page 6
10 Pinpoint Labs Releases One Click Collect - Harvester Server Edition Forensically Collect and Preserve Active File Data From Multiple Custodians At Same Time Each day, corporate IT managers, computer forensic examiners, and litigation support professionals need to collect relevant files that reside in file shares, on client systems, and in other data sources across the network. One Click Collect Harvester Server Edition (OCCHS) solves the common problems encountered when using alternative copy utilities. Murray, NE (For Immediate Release) May 21 st, Pinpoint Labs, a forensics software developer and litigation support firm, today announced the release of the latest addition to its One Click Collect family of forensic software Harvester Server Edition. This new version is designed to simultaneously take care of multiple custodian collections that reside on the network, making it the perfect choice for large and small scale ESI collections and legal holds. With the ability to script the software and its user friendly interface, it is the most hassle-free way to collect and preserve electronic discovery files. The goal of any electronic discovery collection is to preserve and collect files while keeping the chain of custody intact. One Click Collect - Harvester Server Edition (OCCHS) has the ability to cull down the collection at the point of contact. This makes multiple collections much easier to manage and less expensive to process. OCCHS gives you unlimited concurrencies to dedupe, denist, cull, and filter ESI collections. In keeping with the best practices for preserving and collecting data, Pinpoint Labs designed OCCHS to easily gather multiple files with minimal impact on client systems. When the client project is finished, all the critical data is neatly organized and forensically sound. It is also one of the most affordable solutions available to collect and preserve project data. As Jon Rowe, President of Pinpoint Labs and an experienced Certified Computer Examiner (CCE) noted, "We are very proud to announce the Harvester Server license. We constantly hear about the corporate budget restraints related to litigation. We know we have created a product that companies can afford, and allows them to complete defensible collections." For more insight on how One Click Collect - Harvester Server Edition can save you time and money, please visit our Pinpoint Labs website by clicking on About Pinpoint Labs Pinpoint Labs was founded by Jon Rowe and James Beasley, who are Certified Computer Examiners and members of The International Society of Forensic Computer Examiners. Their experience includes over fifteen years of litigation support and more than two decades in software development. Visit our website to download our freeware utilities for use by the forensic community.
11 Pinpoint Labs Releases One Click Collect - Harvester 2.0 Industry Leading Electronically Stored Information (ESI) Collection Software Includes Keyword Culling and PST Regeneration Each day, corporate IT managers, forensic computer examiners, and litigation support professionals need to perform keyword-targeted collections of custodian work product that reside in file shares, on client systems, and in other data sources across the network. One Click Collect Harvester 2.0 rapidly culls down hundreds of Gigabytes or even Terabytes of data providing ready to review, relevant documents and . Murray, NE (For Immediate Release) November 1 st, Pinpoint Labs, a forensic software and litigation support firm, today announced the release of the latest addition to its One Click Collect family of forensic software Harvester 2.0. This new version is designed to perform keyword culling for loose files and Microsoft Outlook PST files and attachments, making it the perfect choice for projects requiring targeted collections outlined in legal holds. With the ability to dedupe and regenerate new PST files, the size of ESI collections can be significantly reduced without the costs associated with per gigabyte or custodian fees. The goal of any electronic discovery collection is to preserve and collect files while keeping the chain of custody intact. One Click Collect - Harvester 2.0 has the ability to cull down the collection at the point of contact. This makes multiple collections much easier to manage and less expensive to process. Harvest 2.0 preserves file timestamps, metadata and the chain of custody. In keeping with the best practices for preserving and collecting data, Pinpoint Labs designed Harvester 2.0 to easily gather multiple files with minimal impact on client systems. When the client project is finished, all the critical data is neatly organized and forensically sound. It is also one of the most affordable solutions available to collect and preserve project data. As Jon Rowe, President of Pinpoint Labs and an experienced Certified Computer Examiner (CCE) noted, "We are very proud to announce the Harvester 2.0. Once again we have responded to the marketplace and the need for affordable, defensible ESI collection software. The new keyword filtering and PST regeneration features are equally effective for collecting data in the field or as first pass filtering for in-house processing. For more insight on how One Click Collect - Harvester 2.0 can save you time and money, please visit the Pinpoint Labs website at About Pinpoint Labs Pinpoint Labs was founded by Jon Rowe and James Beasley, who are Certified Computer Examiners and members of The International Society of Forensic Computer Examiners. Their experience includes over fifteen years of litigation support and more than two decades in software development. Visit our website to schedule a product demonstration or request an evaluation license.
12 SafeCopy 2 Active File Collection Utility SafeCopy 2 Features: a Select from multiple data sources (such as file shares, individual files or file list) a Support for paths greater than 255 characters (up to 32,000) a Will resume automatically after network outages a Real time error display a100% file copy verification (using MD5 hash comparison) a Preservation of file system timestamps and metadata a Filter by file extension (inclusion, exclusion and use file extension) and date range Pinpoint Labs Oddo Circle Murray, NE (402) Forensically Sound File Collection Incomplete and undocumented electronic discovery collections occur every day. The result of mishandling these files can be costly to both the client and their legal counsel. Proper file collection methods should be discussed at the beginning of each case. When collecting electronic discovery, you should use processes and applications that preserve and verify collected electronic files with minimal impact on client systems. Without these, creating defensible and verifiable electronic discovery productions and evidence authentication is difficult, if not impossible. SafeCopy 2 is offered in several different formats tailored to fit your needs and the needs of your project. Now you can quickly and easily obtain defensible forensically sound active file collections. To learn more about SafeCopy 2 or to obtain the software, call or sales@pinpointlabs.com. Desktop Server Nomad
13 SafeCopy 2 Desktop a Installed on the local computer a Licensed to a single system a Capable of accessing all local and networked devices SafeCopy 2 Server a Perfect for companies with ongoing collection needs a Freedom to use SafeCopy 2 on any computer on your network a Runs from server, external USB or NAS device a Small footprint a No installation required SafeCopy 2 Nomad a Easily distribute temporary SafeCopy license a Perfect for clients who have a one time, short term collection project a Hassle free no USB drive or software to track or return a Runs from external hard drive, flash drive or server a Create job file for automated collection
Pinpoint Labs ESI Collection Tools
Pinpoint Labs ESI Collection Tools Pinpoint Labs offers two separate product families that enable users to perform defensible electronically stored information (ESI) collections. The products are SafeCopy
More informationProduct Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360
Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated
More informationTake control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
More informationHire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers
Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,
More informationWAM!NET Direct! SM. Service Description
WAM!NET Direct! SM Service Description INTRODUCTION The Direct! Service is a subscription based content delivery service that provides customers with the ability to send, receive, and track digital files
More informationNext Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today
: What Every GC Should Be Doing Today ZL TECHNOLOGIES, INC. WHITE PAPER ZL Technologies Inc. 2000 Concourse Drive, San Jose, CA. 95131. 408.240.8989. www.zlti.com Table of Contents Legal holds: What legal
More informationZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS
ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive
More informationPreservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues
Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer
More informationDiscovery Attender. Version 2.2. White Paper. Discovery Attender is a member of the Attender Utilities family.
Discovery Attender Version 2.2 White Paper Discovery Attender is a member of the Attender Utilities family Table of Contents Introduction...3 Benefits...4 Product Overview...5 FAQ...8 Product History...12
More informationarchiving with Office 365
Email archiving with Office 365 ISO CERTIFIED info@cryoserver.com www.cryoserver.com +44 (0) 800 280 0525 Table of Contents 1.0 Purpose of Document 2 2.0 Email archiving in Office 365 2 2.1 Deleted folder
More informationDefensibility: The Dirty Little Secrets of ediscovery
WHITE PAPER Defensibility: The Dirty Little Secrets of ediscovery Executive Summary To download the full version of this White Paper please visit http://veniosystems.com/new/whitepaper.php. By Babs Deacon
More informationA Lawyer s Guide to ediscovery Processing
A Lawyer s Guide to ediscovery Processing What You Should Know to Competently Handle Your Case Christian DeTrude Lexbe ediscovery Webinar Series About our Webinars If you have technical issues or questions,
More informationFederal Rules of Civil Procedure IT Obligations For
Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,
More informationMatt Danner Flashback Data
Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods
More informationRFP No R. e-discovery SYSTEM. ADDENDUM NO. 2 March 9, 2016 TO ALL BIDDERS: PLEASE NOTE THE FOLLOWING CHANGES:
County Executive Steven R. Schuh RFP No. 16-031R e-discovery SYSTEM ADDENDUM NO. 2 March 9, 2016 TO ALL BIDDERS: PLEASE NOTE THE FOLLOWING CHANGES: QUESTIONS: 1. The RFP states the system should be able
More informationE-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.
E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal
More informationI-9 AND E-VERIFY VENDOR DUE DILIGENCE
I-9 AND E-VERIFY VENDOR DUE DILIGENCE WHITE PAPER I-9 and E-Verify Vendor Due Diligence Key questions to ask electronic I-9 vendors to ensure you are making the best choice for your business. 1. Vendor
More informationRecovery ROI: Doing More with Less. How to Save Time and Money when Recovering
Email Recovery ROI: Doing More with Less How to Save Time and Money when Recovering Email 2 2 3 4 4 6 The Cost of Recovering Email Storage Costs Infrastructure Costs Time Costs Human Resource Costs How
More informationArchive to the Cloud: Hands on Experience with Enterprise Vault.cloud
Archive to the Cloud: Hands on Experience with Enterprise Vault.cloud Description See first-hand how Enterprise Vault.cloud, Symantec's hosted archiving service, can help address mailbox management, email
More informationDeloitte Discovery Caribbean & Bermuda Countries Guide
Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Caribbean & Bermuda Countries Our Region Deloitte CBC primarily serves businesses located or
More informationCommunity Development Commission of the County of Los Angeles
VDI (Virtual Desktop Infrastructure) Implementation 2018 NACo Achievement Awards 1. Abstract of the Program. (~200 words or less). Summarize the program include the program description, the purpose, and
More informationA revolutionary visual security and analytics solution
A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing
More informationTop Ten Tips for Managing e-discovery Vendors
Top Ten Tips for Managing e-discovery Vendors Apr 03, 2013 Top Ten By Daniel B. Garrie This resource is sponsored by: By Daniel B. Garrie, Senior Managing Partner, Law & Forensics LLC, Thomson Reuters
More informationViewpoint Review & Analytics
The Viewpoint all-in-one e-discovery platform enables law firms, corporations and service providers to manage every phase of the e-discovery lifecycle with the power of a single product. The Viewpoint
More informationWHITE PAPER ediscovery & Netmail. SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR.
WHITE PAPER ediscovery & Netmail SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR. ediscovery and Netmail In the ediscovery world, the Electronic Discovery Reference Model (EDRM) has been the
More informationDoConference Web Conferencing: DoMore DoConference
DoConference Web Conferencing: DoMore DoConference Use DoConference Conferencing for: Training and E-Learning Deliver interactive online classes, E-Learning sessions and educate easily and affordably.
More informationFinding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics
Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing
More informationFive Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer
Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer INTRODUCTION Meeting HIPAA and HITECH security and compliance requirements is a formidable challenge.
More informationEXAM Administration of Symantec ediscovery Platform 8.0 for Users. Buy Full Product.
Symantec EXAM - 250-412 Administration of Symantec ediscovery Platform 8.0 for Users Buy Full Product http://www.examskey.com/250-412.html Examskey Symantec 250-412 exam demo product is here for you to
More informationEnhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management
SharePoint 2013 and Colligo Apps Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Email Management SharePoint 2013 is the latest release of Microsoft s leading business collaboration
More informationEvaluator Group Inc. Executive Editor: Randy Kerns
Avoiding an Infrastructure Cost Explosion as You Move to Exchange 2010 Metalogix Archive Manager Evaluator Group Inc. Technology Insight Series Executive Editor: Randy Kerns Version 1: January 2012 Copyright
More informationUNITRENDS CLOUD BACKUP FOR OFFICE 365
UNITRENDS CLOUD BACKUP FOR OFFICE 365 FREQUENTLY ASKED QUESTIONS Unitrends Cloud Backup for Office 365 provides full, automatic protection that is purpose-built for Microsoft SaaS applications, eliminating
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of
More informationWhite Paper. Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers
White Paper Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers By Brian Babineau Analyst Intelligent Information Management March, 2007 Copyright 2007. The, Inc. All
More informationCian Kinsella CEO, Digiprove
Cian Kinsella CEO, Digiprove cian.kinsella@digiprove.com Malaga 7 th June 2013 Been developing software since 1972 Commercial and Freelance Co-founder of 3 Software Product Companies Have had many different
More informationCould Your Systems be Hindering Your Most Productive Employees?
MAIMIZING BUSINESS VALUE WITH OPERATIONAL ARCHIVING Could Your Email Systems be Hindering Your Most Productive Employees? An Executive Guide to Maximizing Business Value with Operational Archiving EECUTIVE
More informationThree Common Techniques for E-Discovery Preservation
www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...
More informationManaging Backup, Recovery and Migration in Exchange Environments
Managing Email Backup, Recovery and Migration in Exchange Environments 2011 StorageCraft Technology Corporation. All Rights Reserved. This brochure is for informational purposes only. STORAGECRAFT MAKES
More informationUncovering the Full Potential of Avid Unity MediaNetworks
Uncovering the Full Potential of Avid Unity MediaNetworks REALIZING GREATER REWARDS WITHOUT THE TRADITIONAL RISKS Archion Technologies 700 S. Victory Blvd Burbank, CA. 91502 818.840.0777 www.archion.com
More informationDEDUPLICATION BASICS
DEDUPLICATION BASICS 4 DEDUPE BASICS 6 WHAT IS DEDUPLICATION 8 METHODS OF DEDUPLICATION 10 DEDUPLICATION EXAMPLE 12 HOW DO DISASTER RECOVERY & ARCHIVING FIT IN? 14 DEDUPLICATION FOR EVERY BUDGET QUANTUM
More informationProduct Overview Archive2Anywhere. From Archive360
Product Overview Archive2Anywhere From Archive360 Archive2Anywhere for Email Archive Migration Archive2Anywhere is the premier email archive migration solution designed specifically to work with all the
More informationNext Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures
Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting
More informationE-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS
E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS Agenda E-discovery Legal Issues Elements of a Litigation Hold Identification and Data Mapping of ESI Preservation and Collection Early Case Assessment Processing
More informationSYSTEM SPECIFICATIONS GUIDE
SYSTEM SPECIFICATIONS GUIDE AD Enterprise NETWORK INVESTIGATION AND POST-BREACH ANALYSIS v6.5 Revision (May 8, 2018) www.accessdata.com Contents AccessData Enterprise Overview and System Specifications
More informationThe New USB-C Standard and How to Select a Matching Docking Station
The New USB-C Standard and How to Select a Matching Docking Station WHITE PAPER What is USB-C? USB-C, the latest USB standard, is attracting attention from all over the technology industry, as it carries
More informationContact us at. A White Paper by PioneerMarketers for Customer Acquisition Success
A White Paper by PioneerMarketers for Customer Acquisition Success In 2009, two strategies top for improving business profitability - acquiring new customers (44%) and customer retention (25%). Of these
More informationDupScout DUPLICATE FILES FINDER
DupScout DUPLICATE FILES FINDER User Manual Version 10.3 Dec 2017 www.dupscout.com info@flexense.com 1 1 Product Overview...3 2 DupScout Product Versions...7 3 Using Desktop Product Versions...8 3.1 Product
More informationInTact Technology : Cutting the Last Tie Holding the Wireless Office to the Desktop. October 2006
InTact Technology : Cutting the Last Tie Holding the Wireless Office to the Desktop October 2006 Executive Summary Handheld mobile devices have gone a long way to liberate workers from trips back to the
More informationQuickSpecs HP Archiving software for Microsoft Exchange 2.2
Overview HP Email Archiving software (EAs) for Microsoft Exchange is client software that integrates with HP Integrated Archive Platform (IAP) to help you mitigate business risks associated with legal
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is
More informationSimplify the future. Bpm online marketplace Development Guide
Simplify the future Bpm online marketplace Development Guide Table of Contents How to start the development for marketplace 2-3 Developer workspace 4 Developer profile setup 4-5 Ordering development site
More informationFeature Set. Intelligent Archiving & ediscovery Software Solutions
Intelligent Email Archiving & ediscovery Software Solutions Summary: SonaVault 6.1 is an on-premise email archiving and ediscovery software solution that is specifically designed to work with Microsoft
More informationMD5 FILE HASHER USER MANUAL
User Manual Digital-Tronic Software Development MD5 FILE HASHER USER MANUAL Dated: October 2014 WELCOME MD5 File Hasher is a simple program which allows you to create and compare check sums. This allows
More informationQUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS
QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS WORKING TOGETHER FOR THE COMMUNITY// F1 Solutions is committed to providing positive change in our community. That is why we offer more than a service, it
More informationThis Webcast Will Begin Shortly
This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: accwebcast@commpartners.com Thank You! Welcome! Electronic Data
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationARCHIVE ESSENTIALS
EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has
More informationTo Share Or Not To Share: The Debate Over ediscovery Protocols. Please Read The Scenario Hand-Outs
To Share Or Not To Share: The Debate Over ediscovery Protocols Please Read The Scenario Hand-Outs Participants Honorable Terence P Kemp US Magistrate Judge, US District Court Southern District of OH Honorable
More informationMoving Data on the Edge. The fastest & most reliable way to transfer files
Moving Data on the Edge The fastest & most reliable way to transfer files Resilio Connect The Fastest & Most Reliable Way to Move Files Our customers use Resilio Connect for the peace of mind at reliably
More informationManagement: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationShielding the Organization from Data Risk & E- Discovery Failures
Shielding the Organization from Data Risk & E- Discovery Failures Ignatius Grande, Senior Discovery Attorney, Hughes Hubbard Jordan Razza, Senior Counsel and Director of U.S. Litigation, Diageo North America,
More informationCryptoEx: Applications for Encryption and Digital Signature
CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server
More informationForensics for Cybersecurity. Pete Dedes, CCE, GCFA, GCIH
Forensics for Cybersecurity Pete Dedes, CCE, GCFA, GCIH WHO AM I? Pete Dedes, Forensics Analyst, Sword & Shield Enterprise Security Education Bachelor s of Science Computer Science, University of Tennessee
More informationUnderstanding Computer Forensics
Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells
More informationOnline Demo Guide. Barracuda PST Enterprise. Introduction (Start of Demo) Logging into the PST Enterprise
Online Demo Guide Barracuda PST Enterprise This script provides an overview of the main features of PST Enterprise, covering: 1. Logging in to PST Enterprise 2. Client Configuration 3. Global Configuration
More informationSample Exam. Advanced Test Automation - Engineer
Sample Exam Advanced Test Automation - Engineer Questions ASTQB Created - 2018 American Software Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,
More informationTechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy
TechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy Reference: http://www.microsoft.com/technet/prodtechnol/office/sps2003/deploy/spst2003.mspx?pf=true
More informationRio-2 Hybrid Backup Server
A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject
More informationTARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS.
TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS Introduction State and local government departments, agencies and groups face a wide variety of events. Each have their own unique characteristics.
More informationAPPLYING THE POWER OF AI TO YOUR VIDEO PRODUCTION STORAGE
APPLYING THE POWER OF AI TO YOUR VIDEO PRODUCTION STORAGE FINDING WHAT YOU NEED IN YOUR IN-HOUSE VIDEO STORAGE SECTION 1 You need ways to generate metadata for stored videos without time-consuming manual
More informationWelcome New Client. Welcome to the family! keitaj.com
Welcome New Client Keitaj Images & Designs was founded in Southern, California - April of 2004 and now currently based in Bowie, Maryland. Whether this is your first website, or you want a redesign of
More informationCircling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.
Circling the Wagons How to Implement an Effective Litigation Hold Copyright 2006 IE Discovery, Inc. All rights reserved. Agenda Importance of Document Retention Plan Litigation Hold Best Practices Case
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments
Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationOperating System Specification Mac OS X Snow Leopard (10.6.0) or higher and Windows XP (SP3) or higher
BlackLight is a multi-platform forensic analysis tool that allows examiners to quickly and intuitively analyze digital forensic media. BlackLight is capable of analyzing data from Mac OS X computers, ios
More informationWorkflow Innovation, The Optical Way
Workflow Innovation, The Optical Way Generations of Innovation First Generation Film to Video for revolutionized news gathering From the dawn of audio-visual innovation, Sony has been with you. Years ago,
More informationDeploying Modern Video Surveillance in Restaurants with the Cloud
Keep Watch on Your Business Through the Cloud, 24/7/365 APPLICATION BRIEF Deploying Modern Video Surveillance in Restaurants with the Cloud From a Small Business to an Entire Chain See It All from Anywhere
More informationExchange 2010 & 2013 Archiving & ediscovery Realities
Exchange 2010 & 2013 Brandy Markey Senior Product Marketing Manager Alex Brown Senior Product Manager Informed Decisions Where did Stu go wrong? Requirements Requirements Requirements Requirements Requirements
More informationThe Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration
The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of
More information10 th National Investigations Symposium
10 th National Investigations Symposium AVOIDING FORENSIC PITFALLS First Responders Guide to Preserving Electronic Evidence 6 November 2014 Bronwyn Barker Electronic Evidence Specialist Investigation 5
More informationTechDirect User's Guide for ProDeploy Client Suite
TechDirect User's Guide for ProDeploy Client Suite Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates
More informationIBM Content Manager Compliance Solution with IBM System Storage N Series SnapLock devices
IBM Content Manager Compliance Solution with IBM System Storage N Series SnapLock devices Author: Raghuram Tadipatri Senior Manager, IBM tadipatr@us.ibm.com Dated: 5/20/2013 Copyright IBM (2013). This
More informationKEYCLOUD BACKUP AND RECOVERY AS-A-SERVICE (BRAAS): A fully-managed backup and recovery solution for your mission critical data
KEYCLOUD BACKUP AND RECOVERY AS-A-SERVICE (BRAAS): A fully-managed backup and recovery solution for your mission critical data 1 BACKUPS ARE GENERALLY A THANKLESS JOB Every IT organization needs to run
More informationThe future of file comparison
White Paper The future of file comparison Compare Everywhere What s inside? A guided tour: 3 The future is designed by users read page 3 4 The evolution of file comparison read page 4 5 6 7 It s all about
More informationMcAfee Total Protection for Data Loss Prevention
McAfee Total Protection for Data Loss Prevention Protect data leaks. Stay ahead of threats. Manage with ease. Key Advantages As regulations and corporate standards place increasing demands on IT to ensure
More informationThe Upside to Active Mail Management - Five Reasons to Actively Manage Mail
The Upside to Active Mail Management - Five Reasons to Actively Manage Mail A White Paper from Avalon Introduction As we are all aware, the state of mail management in most organizations is not good. Most
More informationOverview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving
EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationWHITEPAPER SWITCHING TO HOSTED VOICE
WHITEPAPER SWITCHING TO HOSTED VOICE ADVANTAGES OF HOSTED VOICE Hosted Voice, also known as Hosted VoIP, allows your business to make phone calls using the same broadband connection you use to connect
More informationSymantec Document Retention and Discovery
IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationIRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]
IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The
More informationEnterprise Findability Without the Complexity
Enterprise Findability Without the Complexity With the clutter of information inside enterprises today, effective findability 1 is fast becoming a necessity. Users are asking for it and executives are
More informationCompTIA CAS-003. CompTIA Advanced Security Practitioner (CASP)
CompTIA CAS-003 CompTIA Advanced Security Practitioner (CASP) http://killexams.com/pass4sure/exam-detail/cas-003 DEMO Find some pages taken from full version Killexams CAS-003 questions and answers are
More informationMailbox Management with Symantec Enterprise Vault.cloud
WHITE PAPER: MAILBOX MANAGEMENT WITH SYMANTEC ENTERPRISE............ VAULT.CLOUD............. UPDATE............... Mailbox Management with Symantec Enterprise Vault.cloud Who should read this paper This
More informationTechnology Insight Series
IBM ProtecTIER Deduplication for z/os John Webster March 04, 2010 Technology Insight Series Evaluator Group Copyright 2010 Evaluator Group, Inc. All rights reserved. Announcement Summary The many data
More informationECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump
ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops
More informationSecurity Automation Best Practices
WHITEPAPER Security Automation Best Practices A guide to making your security team successful with automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough
More informationStellar Phoenix Mailbox Exchange. Recovery 8.0
Stellar Phoenix Mailbox Exchange Recovery 8.0 Overview Stellar Phoenix Mailbox Exchange Recovery offers a complete solution to recover corrupt MS Exchange database files. The software recovers corrupt
More informationExploring Cloud. Is moving your phone system to the cloud right for your business?
Exploring Cloud Is moving your phone system to the cloud right for your business? So You re Thinking about Moving Your Phone System to the Cloud. That s great! A cloud phone system gives you access to
More information