The Next Generation of Concept Searching: Clearwell Transparent Concept Search
|
|
- Cody Stokes
- 6 years ago
- Views:
Transcription
1 WHITE PAPER: THE NEXT GENERATION OF CONCEPT SEARCHING The Next Generation of Concept Searching: Clearwell Transparent Concept Search
2
3 The Next Generation of Concept Searching Contents Introduction Given the Benefits of Concept Search, Why isn t it More Commonly Utilized?.. 2 Increased ediscovery Cost & the Black Box Problem 2 Introducing Transparent Concept Searching How to Use Clearwell s Transparent Concept Search Transparent Concept Search for Early Case Assessment & Legal Defensibility 4 Transparent Concept Search for Review & Quality Assurance 6 Conclusion
4 Introduction A recent article published in The Economist states that according to one estimate, mankind created 150 exabytes (billion gigabytes) of data in This year, it will create 1,200 exabytes. 1 To put these numbers in perspective, all the catalogued books in the library of congress total 15 terabytes, while 5 petabytes (approximately 5,000 terabytes) is roughly equal to all the letters delivered by the US postal service in Although, terabyte comes from the Greek word meaning monster, a terabyte is dwarfed by the size of an exabyte. An exabyte 2 is about 1,000 petabytes and is estimated to be equal to all the printed material in the world. 3 Not surprisingly, the exponential growth of information results in a critical challenge to the justice system since evaluating Electronically Stored Information (ESI) is often one of the most important facets of litigation. 4 In recent years, parties involved in legal disputes have commonly relied on basic keyword searching technologies to identify and exchange ESI related to a matter. Although leveraging technology to search for keywords was perceived as a great leap forward among lawyers who historically reviewed paper documents without the aid of technology, keyword search technology by itself is often inadequate to meet today s ediscovery challenges without resulting in unnecessary risk, expense, or both. The problem is that keyword searches tend to be both over and under-inclusive at times in light of the inherent ambiguity of language. 5 For example, the ambiguous nature of the word strike could result in a keyword search that identifies a broad range of documents relating to labor unions, a military action, bowling, or a baseball game even though the matter in question deals only with a labor union strike. 6 The over-inclusive nature of the search results in what is referred to as low precision and could have serious financial consequences because the excess documents that are retrieved must typically be segregated as responsive or non-responsive by legal teams paid hourly for document review. On the other hand, failing to guess the right keywords to use as part of the search could have the opposite under-inclusive effect since potentially relevant documents not containing the keyword strike may be completely overlooked. The failure to retrieve these documents may not only impact the outcome of the matter, it could also lead to legal risk in the form of sanctions if the information is not identified and produced to the requesting party. Keyword searching initially introduced a simple way to retrieve and produce documents during discovery, but the inherent limitations of keyword searching have been magnified as data volumes grow and judicial scrutiny increases. 7 Not surprisingly, more intelligent search technology has evolved to meet these needs. Although none of these technologies solved all the limitations of keyword searching, traditional concept search technology made strides in addressing the risk of under-inclusive keyword searches, but in a way 1 Bret Ryder, The Data Deluge, The Economist, Feb. 25, 2010 at (last visited Dec. 30, 2010) 2 All too much Monstrous amounts of data, The Economist, Feb. 25, 2010 at (last visited Dec. 30, 2010) 3 See Exabyte definition: (last visited Dec. 30, 2010) 4 The Sedona Conference Best Practices Commentary on the use of Search & Informational Retrieval Methods in ediscovery, 8 Sedona Conf. J. 189, 194 (2007) ( Sedona Conference Best Practices ) 5 See Sedona Conference Best Practices, Id. at Id. at See Victor Stanley Inc. v. Creative Pipe,Civ. No. MJG , 2008 WL (D. Md. May 29, 2008) (Defendant s questionable search methodology led to waiver of privilege and work-product protection with respect to 165 documents). 1
5 that increases expenses in exchange for reducing risk. To address this industry need, Clearwell s next generation Transparent Concept Search technology takes traditional concept searching a step further by empowering practitioners to reap the advantages of traditional concept searching while actually reducing instead of increasing ediscovery expenses. Given the Benefits of Concept Search, Why isn t it More Commonly Utilized? The over-inclusive nature of traditional concept search technology results in significantly greater ediscovery expenses in the form of vendor costs and downstream document review. Incurring significantly greater document review expenses to reduce the risk that important documents are overlooked is a difficult case by case economic decision that has hampered large scale adoption of traditional concept searching in the legal industry. The main reasons traditional concept searching is used sparingly or not at all are discussed below. Increased ediscovery Cost & the Black Box Problem Traditional concept searching reduces the risk of information being overlooked by searching more broadly than keyword searching technology, but the benefits are often overshadowed by the technology s lack of precision. In other words, traditional concept searching reduces risk by retrieving a much larger number of potentially responsive documents than keyword searching, but many of these documents are irrelevant or false positives that must be segregated from responsive documents through manual (linear) document review at great cost. According to industry estimates, these linear document review costs are significant because attorneys can typically only review between 50 and 60 documents per hour when conducting a linear page by page document review. 8 That means if law firm associates are billed out at an average of $100/hour to review 50,000 documents, the cost of reviewing those documents would be somewhere between $80,000 and $100,000. The problem stems from the fact that traditional concept searching like basic keyword searching is done in a black box. A black box search means users have no visibility or control over which concepts are included as part of a search because every concept related to the key term is automatically included as part of the search whether or not the concept is relevant. This one size fits all approach means every concept search tends to be unnecessarily broad since traditional concept searching doesn t allow the user to intelligently narrow the search results. (See figure 1). Figure 1: Traditional concept searching is done in a black box, meaning users have no visibility or control over which concepts are included as part of a search. 8 Bennett B. Borden, The Demise of Linear Review, Williams Mullen ediscovery Alert Oct.,
6 For example, although concept searching the term strike to investigate a labor dispute would likely recall relevant documents about labor union contracts, it might also recall thousands of irrelevant documents related to a military action, bowling, or a baseball game. Since linear document review is one of the costliest facets of ediscovery, lawyers and their clients may choose to gamble and run the risk of sanctions or producing privileged documents rather than utilizing traditional concept searching to help minimize these risks. Many who might otherwise overlook the additional document review costs resulting from the use of traditional concept search technology still reject the technology because it is often more expensive than basic keyword search technology. More specifically, ediscovery software solutions containing concept searching functionality must almost always be purchased separately. This additional software cost typically cannot be circumvented by using a vendor services model since vendors typically charge a premium (directly or indirectly) for processing data through concept searching engines. Given these financial trade-offs, traditional concept searching has not been widely adopted. Introducing Transparent Concept Searching Clearwell s next generation Transparent Concept Search technology provides the same advantages as traditional concept searching without the drawbacks. In addition to identifying potentially relevant documents containing concepts related to keywords, Transparent Concept Searching technology significantly reduces the time and expense resulting from over-inclusive document retrieval by allowing users to eliminate documents containing concepts that are not relevant to the intended search. This is accomplished by providing a transparent view into the contents of the black box so that users can actually visualize and select (or deselect) the range of concepts related to a particular term before the search is executed. This transparent approach to concept searching gives legal teams strategic advantages during meet and confer and settlement negotiations because cases can be assessed faster and with more accuracy. Similarly, Transparent Concept Searching s comprehensive approach increases legal defensibility by eliminating the risk that documents are overlooked while simultaneously reducing downstream processing and review costs by retrieving only the most relevant documents for review. Not only does Clearwell s Transparent Concept Search technology decrease the overall number of documents to be reviewed through greater search precision, the technology also organizes documents logically making document review faster and more accurate. The idea is that attorneys reviewing randomly organized documents are not as productive as they could be if the same set of documents was logically organized by similar concepts and degrees of relevance. Studies have shown that reviewers using advanced techniques can review documents up to 6 times faster than traditional linear reviewers and with better accuracy. 9 Applying a six fold increase to the review rates mentioned earlier would result in an astounding reduction in review cost exceeding 80%. 10 This potentially tremendous cost savings doesn t even account for the cost savings discussed earlier that are a result of Transparent Concept Search s ability to 9 Id. 10 Assuming a billing rate of $100/hour, the total cost to review 50,000 documents decreases from $100,000 to $16,666 when the rate of document review per hour is increased from 50 to 300. This results in document review cost savings that exceed 80 percent. 3
7 significantly reduce the number of documents even requiring review. The ability to exclude or include documents with far greater precision coupled with the ability to review documents faster not only saves money, it makes assessing cases earlier and meeting critical deadlines easier. Unlike most traditional concept searching modules, Clearwell s Transparent Concept Search feature provides all of these benefits at no additional licensing cost. How to Use Clearwell s Transparent Concept Search Clearwell s Transparent Concept Search contains three interactive features designed to simplify and mimic common legal discovery workflows. First, Transparent Concept Search Preview enables users to enter a keyword and automatically generate a list of related concepts ranked by relevance (frequency of occurrence). Prior to launching a search, the user can easily refine the search by selecting relevant concepts and ignoring irrelevant concepts. Clearwell s Transparent Concept Search Explorer simplifies the process of constructing searches by providing a visual representation of various concepts in an intuitive graphical display that dynamically changes as new concepts are added or eliminated to explore different search options. Finally, Clearwell s Transparent Concept Search Report provides detailed analytics for each search and documents how the search was constructed. These features help streamline the legal team s ability to assess cases early and defensibly, prepare for meet and confer conferences and other negotiations more efficiently, and minimize document review costs. Transparent Concept Search for Early Case Assessment & Legal Defensibility The ability to pick and choose which concepts will be included as part of a search introduces a new era in early case assessment that gives users earlier insight into documents that could be critical to the outcome of a case. For example, searching for the keyword diamond as part of an investigation into insider trading of Apple stock by Diamond Investment Company would yield significantly different results depending on the technology used. Traditional concept searching tools are black box technologies that would automatically include every concept (such as other precious gems) related to the term diamond in the search and return a high number of irrelevant documents thereby delaying the ability to assess the case thoroughly and quickly. On the other hand, Clearwell s Transparent Concept Search technology gives users the flexibility to see and select only the precise concepts related to the word diamond that should logically be included in the search while excluding other irrelevant concepts. (See figure 2). The ability to search with precision enables legal teams to understand and assess case strategy earlier without getting bogged down with coursing through irrelevant documents. 4
8 Figure 2: Clearwell s Transparent Concept Search Preview (above left) and Transparent Concept Search Explorer (above right) give users the flexibility to see and select only the precise concepts related to the word diamond that should logically be included in the search while excluding other irrelevant concepts. Clearwell s Transparent Concept Search also minimizes the risk that key documents are overlooked to insure that cases are assessed early and accurately. For example, searching the keyword diamond as part of the Apple insider trading scandal may not reveal that the code term football was used by some employees to cover up discussions about their insider trading activities. However, since Clearwell s Transparent Concept Search technology provides a complete list of concepts rated by estimated relevance, there is a clear connection between the keyword diamond and the concept football since football is the top rated concept. (See Figure 2). This information allows documents containing deceptively relevant terms to be retrieved that may have otherwise been overlooked. (See figure 3). The ability to quickly and more comprehensively identify critical documents that could have been overlooked Figure 3: Clearwell s Transparent Concept Search minimizes the risk that key documents are overlooked including documents containing code terms like project football. 5
9 through traditional concept searching results in a more complete understanding of the evidence earlier in the case. Clearwell s Transparent Concept Search Report feature also automatically tracks key criteria so search methodology can be communicated or defended during meet and confer discussions or in court. (See figure 4). Figure 4: Clearwell s Transparent Concept Search Reports automatically track important information so searches suggested as part of meet and confer negotiations can be tested and legal attacks regarding search methodology can be defended. Transparent Concept Search for Review & Quality Assurance Clearwell s Transparent Concept Search technology also expedites document review by providing tools to review ESI in a less expensive non-linear fashion that results in a higher degree of accuracy. As indicated earlier, studies have shown that reviewers using advanced techniques can review documents up to 6 times faster than traditional linear reviewers and with better accuracy. The general idea is that the monotonous task of reviewing hundreds if not thousands of documents for relevance and privilege becomes even more tedious when those documents are not conceptually related. Utilizing Clearwell s Transparent Concept Search functionality to construct intelligent searches for documents with a degree of precision that is not possible in traditional concept searching tools allows documents to be organized and reviewed logically. The more logical the connection between the documents being reviewed by a person, the faster and more accurately that person will be able to review those documents. 11 Similarly, the more certain concepts are unrelated to the intended search, the more likely those documents can be bulk tagged as Not Relevant or Unlikely Relevant so they can be excluded from more comprehensive and expensive linear document review. For example, if entering the keyword diamond yields a list of concepts that include wedding and wedding has a low relevancy rating, then the user may elect to bulk tag all documents containing the concept wedding as Not Relevant after a cursory review. (See figure 5). 11 Id. 6
10 Figure 5: Clearwell s Transparent Concept Search technology enables bulk tagging of clearly irrelevant documents. A similar process can be followed as a quality assurance step to reduce the risk of producing potentially privileged documents. For example, after document review has been completed, a list of privileged terms can be searched to identify conceptually related documents that might contain privileged words that may have otherwise been overlooked. The ability to automate the review and tagging of documents that may have otherwise required manual review coupled with the ability to review any remaining documents faster and with more accuracy is another significant cost saving advantage of Transparent Concept Search over traditional concept search. Conclusion Clearwell s next generation Transparent Concept Search technology overcomes the inherent limitations of traditional concept searching by empowering users to identify, assess, and review evidence faster and with more accuracy resulting in significant reductions in risk and cost. First, Transparent Concept Search streamlines the ability to assess cases early by identifying documents conceptually related to a keyword that may have otherwise been overlooked. Transparent Concept Search technology also opens the black box of traditional concept searching by revealing concepts related to a keyword so only relevant concepts can be selected thereby resulting in more precision and fewer irrelevant documents. The ability to systematically reduce the number of documents to be reviewed by eliminating irrelevant concepts saves money. Additionally, searching with precision results in a thorough understanding of the issues and evidence earlier so case strength and the corresponding negotiation strategy can be determined prior to incurring unnecessary downstream ediscovery costs. Since important criteria can automatically be tracked, search methodology can be communicated to the court and opposing counsel if necessary. 7
11 Second, Transparent Concept Searching allows documents to be organized logically and ranked by relevance thereby streamlining review speed and increasing accuracy. Toward the end of document review, Transparent Concept Search can also be used as a quality assurance tool to identify privileged documents that may have been overlooked during manual review so the risk of privilege waiver can be minimized. No search technology, including Transparent Concept Search, is a silver bullet solution that can completely eliminate the risk and expense of manual document review. However, the Clearwell ediscovery Platform gives users unparalleled flexibility to use a wide variety of search technologies including Transparent Keyword and Transparent Concept Searching to substantially reduce the risk and expense of ediscovery and to maximize strategic advantages. 8
12
13 About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Symantec helps organizations secure and manage their information-driven world with IT Compliance, discovery and retention management, data loss prevention, and messaging security solutions. Copyright 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 02/
Victor Stanley and the Changing Face
Victor Stanley and the Changing Face of E-Discovery What You Need to Know page : 1 Victor Stanley and the Changing Face of E-Discovery What You Need to Know A Clearwell White Paper Victor Stanley and the
More informationClearwell ediscovery Platform Feature Briefing
Clearwell ediscovery Platform 7.1.3 Feature Briefing Custodian Manager This document details the new Custodian Manager feature in Clearwell 7.1.3 If you have any feedback or questions about this document
More informationSymantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
More informationSymantec NetBackup 7 for VMware
V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing
More informationReducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq.
Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq. Sr. ediscovery Counsel, Symantec Today s Speaker Dean Gonsowski, Esq. Mr. Gonsowski is the Sr. ediscovery
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationSymantec Document Retention and Discovery
IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance
More informationThree Steps to Protect Your Virtual Systems
SOLUTION BRIEF: THREE STEPS TO PROTECT YOUR VIRTUAL SYSTEMS........................................ Three Steps to Protect Your Virtual Systems Who should read this paper Businesses who are looking for
More informationPROFILE: ACCESS DATA
COMPANY PROFILE PROFILE: ACCESS DATA MARCH 2011 AccessData Group provides digital investigations and litigation support software and services for corporations, law firms, law enforcement, government agencies
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationViewpoint Review & Analytics
The Viewpoint all-in-one e-discovery platform enables law firms, corporations and service providers to manage every phase of the e-discovery lifecycle with the power of a single product. The Viewpoint
More informationSecondary operation windows in SLPs
NETBACKUP 7.6 FEATURE BRIEFING SECONDARY OPERATION WINDOWS IN SLPS NetBackup 7.6 Feature Briefing Secondary operation windows in SLPs Version number: 1.0 Issue date: 2 nd August 2013 This document describes
More informationChoosing the Right Solution for Strategic Deployment of Encryption
Choosing the Right Solution for Strategic Deployment of Email Encryption White Paper: Enterprise Email Encryption Email Protection Buyer s Guide Choosing the Right Solution for Strategic Deployment of
More informationThe Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration
The Big (and Expensive) Dig: Mining for Data in Megaproject Arbitration Agenda Applicable Rules Realities of Construction Arbitration Efficiently Managing Discovery Actual Arbitration Examples Future of
More informationThree Common Techniques for E-Discovery Preservation
www.pwc.com Three Common Techniques for E-Discovery Preservation Table of contents Introduction... 1 #1: Custodian self-preservation... 2 #2: Preservation by collection... 3 #3: In-place preservation...
More informationWHITE PAPER ediscovery & Netmail. SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR.
WHITE PAPER ediscovery & Netmail SEARCH, PRODUCE, and EXPORT EXACTLY WHAT YOU RE LOOKING FOR. ediscovery and Netmail In the ediscovery world, the Electronic Discovery Reference Model (EDRM) has been the
More informationMicrosoft Virtualization Delivers More Capabilities, Better Value than VMware
It s clear that virtualization can help you save money and operate more effi ciently. However, what may not be so apparent at fi rst glance, is which virtualization approach makes the most sense. VMware
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationSymantec Data Center Migration Service
Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration
More informationResolving Security s Biggest Productivity Killer
cybereason Resolving Security s Biggest Productivity Killer How Automated Detection Reduces Alert Fatigue and Cuts Response Time 2016 Cybereason. All rights reserved. 1 In today s security environment,
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationSEPTEMBER 2018
www.prismlit.com SEPTEMBER 2018 Don t Stop Believin : The Staying Power of Search Term Optimization Since the first model T rolled off of Henry Ford s assembly line, all cars have been made with a steering
More informationWHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management
WHITE PAPER: ENTERPRISE AVAILABILITY Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management White Paper: Enterprise Availability Introduction to Adaptive
More informationThe Symantec Foundation for Microsoft SharePoint Governance
WHITE PAPER: THE SYMANTEC FOUNDATION FOR MICROSOFT........... SHAREPOINT............. GOVERNANCE................ The Symantec Foundation for Microsoft SharePoint Governance Who should read this paper This
More informationNext Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today
: What Every GC Should Be Doing Today ZL TECHNOLOGIES, INC. WHITE PAPER ZL Technologies Inc. 2000 Concourse Drive, San Jose, CA. 95131. 408.240.8989. www.zlti.com Table of Contents Legal holds: What legal
More informationTake control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
More informationProtecting Microsoft SharePoint
TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT SHAREPOINT Backup Exec TM 2014 Technical White Paper Protecting Microsoft SharePoint Technical White Papers are designed to introduce Symantec
More informationSEE WHAT OTHERS DON T
THE DATABERG REPORT: SEE WHAT OTHERS DON T IDENTIFY THE VALUE, RISK AND COST OF YOUR DATA THE STATE OF INFORMATION MANAGEMENT: UNITED KINGDOM & IRELAND UNLOCKING IT AND INFORMATION Extracting greater value
More information2010 E-discovery Best Practices from Real-World Cases
2010 Clearwell E-discovery Best Practices From Real-World Cases page : 1 2010 E-discovery Best Practices from Real-World Cases A Clearwell White Paper 2010 Clearwell E-discovery Best Practices From Real-World
More informationFOR FINANCIAL SERVICES ORGANIZATIONS
RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly
More informationTop Ten Tips for Managing e-discovery Vendors
Top Ten Tips for Managing e-discovery Vendors Apr 03, 2013 Top Ten By Daniel B. Garrie This resource is sponsored by: By Daniel B. Garrie, Senior Managing Partner, Law & Forensics LLC, Thomson Reuters
More informationHow to Jump-Start Early Case Assessment. A Case Study based on TREC 2008
How to Jump-Start Early Case Assessment A Case Study based on TREC 2008 For over a decade, the National Institute of Standards and Technology ( NIST ) has cosponsored the Text Retrieval Conference ( TREC
More informationVeritas CommandCentral Supporting the Virtual Enterprise. April 2009
Veritas CommandCentral Supporting the Virtual Enterprise April 2009 White Paper: Storage Management Veritas CommandCentral Supporting the Virtual Enterprise Contents Executive summary......................................................................................
More informationMeta-Discovery Presents Challenges for Producing Parties
Meta-Discovery Presents Challenges for Producing Parties by Brent Green Rapidly changing technology has created opportunity for business in the 21st century and challenges for litigators along the way.
More informationData Insight Feature Briefing Box Cloud Storage Support
Data Insight Feature Briefing Box Cloud Storage Support This document is about the new Box Cloud Storage Support feature in Symantec Data Insight 5.0. If you have any feedback or questions about this document
More informationDeduplication Option. Backup Exec TM 2014 Technical White Paper
TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 DEDUPLICATION OPTION Backup Exec TM 2014 Technical White Paper Deduplication Option Technical White Papers are designed to introduce Symantec partners and end
More informationQUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2
QUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2 Quick Start Guide for Using Symantec Endpoint Protection for Amazon EC2 Quick Start Guide for Using Symantec Endpoint Protection for Amazon EC2
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationDeliver robust products at reduced cost by linking model-driven software testing to quality management.
Quality management White paper September 2009 Deliver robust products at reduced cost by linking model-driven software testing to quality management. Page 2 Contents 2 Closing the productivity gap between
More informationSmart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center
Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the
More informationTHE CONTRAST ASSESS COST ADVANTAGE
WHITEPAPER THE CONTRAST ASSESS COST ADVANTAGE APPLICATION SECURITY TESTING COSTS COMPARED WELCOME TO THE ERA OF SELF-PROTECTING SOFTWARE CONTRASTSECURITY.COM EXECUTIVE SUMMARY Applications account for
More informationINSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security
Symantec Enterprise Security WHITE PAPER Integrated Security: Creating the Secure Enterprise INSIDE Evolving IT and business environments The impact of network attacks on business The logical solution
More informationEnhancing Security With SQL Server How to balance the risks and rewards of using big data
Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company
More informationMeasuring Your. E-Discovery Program. Against Industry, 2015
Measuring Your E-Discovery Program Against Industry, 2015 Advice from Counsel is sponsored by: Introduction Over seven years and nine reports, the Advice from Counsel study has shared the opinions and
More informationTechnical Brief Enterprise Vault Privileged Delete
1 Feature Description Enterprise Vault 12.3 and Discovery Accelerator 12.3 offer a new feature called. The feature has the following benefits: This feature will help customers to comply with regulations,
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments
Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationUnderstanding the Impact of Early Case Assessment to Your Organization
Understanding the Impact of Early Case Assessment to Your Organization page : 1 Understanding the Impact of Early Case Assessment to Your Organization A Clearwell White Paper Understanding the Impact of
More informationMinimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering
From Terabytes to Trial Exhibits: Controlling Litigation Costs in the Digital Age Minimizing the E-Discovery Spend: Leveraging Technology with Better Lawyering Anne Kershaw Knowledge Strategy Solutions,
More informationArchiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention
Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.
More informationEvaluator Group Inc. Executive Editor: Randy Kerns
Avoiding an Infrastructure Cost Explosion as You Move to Exchange 2010 Metalogix Archive Manager Evaluator Group Inc. Technology Insight Series Executive Editor: Randy Kerns Version 1: January 2012 Copyright
More informationSymantec Backup Exec 2012
Siedziba spółki: Perceptus sp. z o. o. Ul. Drzewna 30/2A 65-140 Zielona Góra Biuro handlowe ul. Chopina 14A 65-031 Zielona Góra Tel. 68 470 07 70 Fax 68 470 07 79 Email: perceptus@perceptus.pl NIP 929-180-85-78
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationSymantec NetBackup Appliances: Key Considerations in Modernizing Your Backup and Deduplication Solutions. Directors of IT and IT Managers
WHITE PAPER: SYMANTEC NETBACKUP APPLIANCES........................................ Symantec NetBackup Appliances: Key Considerations in Modernizing Your Backup and Deduplication Who should read this paper
More informationAchieving Network Storage Optimization, Security, and Compliance Using File Reporter
Information Management & Governance Achieving Network Storage Optimization, Security, and Compliance Using File Reporter Table of Contents page Detailed Network Storage File Reporting and Analysis...2
More informationBUILT FOR THE STORM. AND THE NORM.
BUILT FOR THE STORM. AND THE NORM. Data volumes are overwhelming. Stakes are sky-high. Time frames are shorter than ever. GET ANSWERS NOW. EM[URGENT]CY EXIT In a world where the routine can quickly become
More informationSymantec Advanced Threat Protection: Endpoint
Symantec Advanced Threat Protection: Endpoint Data Sheet: Advanced Threat Protection The Problem Virtually all of today's advanced persistent threats leverage endpoint systems in order to infiltrate their
More informationOracle Buys Automated Applications Controls Leader LogicalApps
Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is
More informationSymantec Secure One Services Program Brief
Symantec Secure One Services Program Brief Align with the industry leader Differentiate your business Increase support services revenue July 2017 Table of Contents Secure One Services Program Overview
More informationdeep (i) the most advanced solution for managed security services
deep (i) the most advanced solution for managed security services TM deep (i) suite provides unparalleled threat intelligence and incident response through cutting edge Managed Security Services Cybersecurity
More informationOVERVIEW BROCHURE GRC. When you have to be right
OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance
More information-archiving. project roadmap CHAPTER 1. archiving Planning, policies and product selection
INSIDE email archiving Planning, policies and product selection CHAPTER 1 Ready to dive into email archiving? Try this four-phased approach to get your project up and running Email-archiving project roadmap
More informationWHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows
WHITE PAPER: ENTERPRISE SOLUTIONS Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows White Paper: Enterprise Security Disk-Based Data Protection Achieving Faster
More informationSOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE
HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling
More informationOPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement
MAXIMIZING TELECOM AND NETWORK OPTIMIZATION The current state of enterprise optimization, best practices and considerations for improvement AOTMP.com The Next Evolution of Telecom Management OVERVIEW As
More informationNow on Now: How ServiceNow has transformed its own GRC processes
Now on Now: How ServiceNow has transformed its own GRC processes Increasing scalability, lowering risk, and slashing costs by $30,000 START 1 Introduction When your business is growing at 0% a year, it
More informationSymantec Business Continuity Solutions for Operational Risk Management
Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.
More informationIBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber
IBM Compliance Offerings For Verse and S1 Cloud 01 June 2017 Presented by: Chuck Stauber IBM Connections & Verse Email and collaboration platform designed to help you work better Empower people Teams are
More informationMITIGATE CYBER ATTACK RISK
SOLUTION BRIEF MITIGATE CYBER ATTACK RISK CONNECTING SECURITY, RISK MANAGEMENT & BUSINESS TEAMS TO MINIMIZE THE WIDESPREAD IMPACT OF A CYBER ATTACK DIGITAL TRANSFORMATION CREATES NEW RISKS As organizations
More informationHow to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.
How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.
More informationVeritas Provisioning Manager
Veritas Provisioning Manager Automated server provisioning, part of the Veritas Server Foundation suite, automates server provisioning and management from physical bare metal discovery and OS installation
More informationProduct Overview Archive2Azure TM. Compliance Storage Solution Based on Microsoft Azure. From Archive360
Product Overview Compliance Storage Solution Based on Microsoft Azure From Archive360 1 Introduction The cloud has quickly become the preferred option for companies to help reverse the growing issues associated
More informationSteps to Eradicate Text Messaging Risk
Steps to Eradicate Text Messaging Risk Use Text Messaging More While Reducing Your Organization s Compliance, Legal and Reputational Risk The popularity of text messaging is growing every year, and many
More informationCylance Axiom Alliances Program
Alliances Program Cylance Axiom Alliances Program Program Overview The Cylance Axiom Alliances Program is a community of cybersecurity solution providers working together to deliver a prevention-first
More informationGDPR: A QUICK OVERVIEW
GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance
More informationVeritas NetBackup and Veritas Enterprise Vault Integration. Now from Symantec
WHITE PAPER: ENTERPRISE SOLUTIONS Veritas NetBackup and Veritas Enterprise Vault Integration Now from Symantec White Paper: Symantec Enterprise Solutions Veritas NetBackup and Veritas Enterprise Vault
More information7 Reasons to Worry About Your Current Archiving Strategy
7 Reasons to Worry About Your Current Email Archiving Strategy The data growth explosion facing most organizations today is coinciding with the mounting demands of stagnant IT budgets and an increased
More informationCloudSOC and Security.cloud for Microsoft Office 365
Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed
More informationUsing TAR 2.0 to Streamline Document Review for Japanese Patent Litigation
877.557.4273 catalystsecure.com CASE STUDY Using TAR 2.0 to Streamline Document Review for Japanese Patent Litigation Continuous Active Review Cuts Cost by Over 85% Catalyst s review platform and its ability
More informationUsing Threat Analytics to Protect Privileged Access and Prevent Breaches
Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers
More informationEarly case assessment Finding value beyond your next lawsuit
Early case assessment Finding value beyond your next lawsuit Contents 1 Introduction 2 Challenges of traditional ediscovery 3 ECA is an ediscovery game changer 4 ECA risks, opportunities, and considerations
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationA Practical Guide to Cost-Effective Disaster Recovery Planning
White Paper PlateSpin A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the
More informationZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS
ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS WELCOME Thank you for joining Numerous diverse attendees Today s topic and presenters This is an interactive presentation You will receive
More informationPlug-in for VMware vcenter
NETBACKUP 7.6 FEATURE BRIEFING PLUG-IN FOR VMWARE VCENTER NetBackup 7.6 Feature Briefing Plug-in for VMware vcenter Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature introduced
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationNetBackup for vcloud Director
NETBACKUP 7.6 FEATURE BRIEFING NETBACKUP FOR VCLOUD DIRECTOR NetBackup 7.6 Feature Briefing NetBackup for vcloud Director Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature
More informationDefensibility: The Dirty Little Secrets of ediscovery
WHITE PAPER Defensibility: The Dirty Little Secrets of ediscovery Executive Summary To download the full version of this White Paper please visit http://veniosystems.com/new/whitepaper.php. By Babs Deacon
More informationAn Oracle White Paper June Exadata Hybrid Columnar Compression (EHCC)
An Oracle White Paper June 2011 (EHCC) Introduction... 3 : Technology Overview... 4 Warehouse Compression... 6 Archive Compression... 7 Conclusion... 9 Introduction enables the highest levels of data compression
More informationSOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE
RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE KEY CUSTOMER BENEFITS: Gain complete visibility across enterprise networks Continuously monitor all traffic Faster analysis reduces risk exposure
More informationWhite Paper. Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers
White Paper Leveraging Analytics to Lower ediscovery Costs: A Study of Clearwell Systems Customers By Brian Babineau Analyst Intelligent Information Management March, 2007 Copyright 2007. The, Inc. All
More informationFinding Holes in Productions Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics
Best Practices in Testing & Reporting on ESI Adequacy Using Modern Analytics September 30, 2015 Karsten Weber Lexbe LC ediscovery Webinar Series Downloadable Resources This webinar is available for viewing
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationGrow Your Services Business
Grow Your Services Business Cisco Services Channel Program One Experience. Expanding Opportunities. Expand Your Services Practice More Profitably Together with Cisco Our customers face tough business
More informationMailbox Management with Symantec Enterprise Vault.cloud
WHITE PAPER: MAILBOX MANAGEMENT WITH SYMANTEC ENTERPRISE............ VAULT.CLOUD............. UPDATE............... Mailbox Management with Symantec Enterprise Vault.cloud Who should read this paper This
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationQUICK START: VERITAS STORAGE FOUNDATION BASIC FOR AMAZON EC2
QUICK START: VERITAS STORAGE FOUNDATION BASIC FOR AMAZON EC2 Quick Start Guide for Using Symantec's Veritas Storage Foundation Basic for Amazon EC2 Quick Start Guide for Using Symantec's Veritas Storage
More informationAdvantage Sales & Marketing LLC
Making Email More Available and Secure, Saving Millions of Dollars After the acquisition of 30 companies, Advantage Sales and Marketing (ASM), one of the fastest growing sales and marketing agencies today,
More informationSustainable Security Operations
Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,
More information