advanced processing and analysis for effective early case assessment

Report 2 Downloads 95 Views
AD  ECA

ADVANCED  PROCESSING   AND  ANALYSIS  FOR  EFFECTIVE   EARLY  CASE  ASSESSMENT

Comprehensive Legal Data Processing and Searching/Culling with No Per-­Gig Fees

  PROCESSING   PROCESSING  

  The  three  keys  to  effective  early  case  assessment  are  data  processing,  efficient   filtering/searching  and  reporting,  but  not  all  solutions  are  created  equal.  Only  AD   ECA  can  deliver  forensic-­level  accuracy  in  processing  along  with  comprehensive   filtering,  search,  and  data  analysis  in  multiple  formats  and  languages.    AD  ECA  is   available  in  three  best-­of-­breed  point  solutions,  including  ready-­to-­use  appliances,   and  will  continue  to  be  featured  in  the   integrated  AD  eDiscovery  platform.

  Automatic Deduplication, De-­NISTing and File Categorization   %   AD  ECA  is  built  on  industry-­standard  forensic  technology  designed  to  handle     complex  data  sets,  categorizing  over  100  different  criteria  and  handling     encrypted  files  with  ease.        

  Process Terabytes of Complex Data per Day at a One Time Price   %   AD  ECA  leverages  true  distributed  processing  for  massive  processing  power     with  no per-­gig fees.         Broadest File Support   %   AD  ECA  supports  700+  file  types  and  email  formats             % Built-­in  OCR  capabilities  to  support  search  and  analysis  of  image  files     Multi-­Language Support     %   Full  Unicode  and  Code  Page  support  for  the  full  spectrum  of  Western   European,  Eastern  European,  Cyrillic  and  Asian  languages.         ANALYSIS     Advanced Email Analysis   %   AD  ECA  shows  email  in  chronological  threads  or  conversations,  allowing  you  to     review  email  in  context.     %   Also  includes  thread  suppression,  ability  to  tag  items  up  or  down  the  chain,  and     hit  highlighting  in  emails  and  attachments.     %   Filter  email  by  Date  Sent  and  Received,  Address,  organized  by  Sender/     Recipient,  and  subcategorized  by  Date,  Email  Domain,  Display  Name  or  Email     Address.         Filtering   %   Extensive  filters  allow  you  to  slice  and  dice  data  by  custodian,  document  type,     data  source,  date,  keyword,  metadata  fields  and  more.       Custodian Analytics       %   Easily  filter  searches  by  custodian(s)  to  determine  relationships  and  monitor   communications  to  gain  a  clear  picture  of  what  transpired.         Advanced Keyword Searching     %   Search  options  include  Boolean,  Proximity,  Stemming,  Related  Words,  Phonic,     Wildcard,  Synonym,  Concept,  Fuzzy  (slider  dials  sensitivity  up  or  down)     %   Relevancy  ranking  based  on  automatic  term  weighting         %   Keyword  variations  panel  allows  you  to  select  which  keyword  variations  you   would  like  to  use.     %   Search  reporting  supports  complex  search  strings,  unlike  other  products  that     break  complex  terms  into  several  simpler  terms.        

THE FORENSIC PROCESSING DIFFERENCE

  The way the ESI is processed can mean the difference between a case won and sanctions for underproduction. Many newer e-­discovery processing modules are not advanced enough to handle complex file types, and it is not uncommon for them to simply skip files they cannot process – sometimes without even logging the error. Thus, an organization has no idea it may be failing to find relevant documents. AccessData’s ECA solution is built on the industry-­standard computer forensic technology, Forensic Toolkit® (FTK®), which is used by law enforcement and government agencies throughout the world. Therefore, AD ECA has a time-­ and battle-­tested ability to handle complex files. If it does encounter a file that it is unable to process, the solution reports on that exception, so personnel can revisit and track as needed. In testing, AD ECA reliably processed more relevant results than other solutions -­ including data sets with the following types of complex data: %   %   %   %   %   %   %   %  

Non-­Windows-­based  files   Corrupt  files   Deleted  files   Large  files   Embedded  files   Open  files  and  emails   New,  exotic  &  unknown  formats   Files  inside  of  files  several  levels   deep  

®

Near-­Native Document Viewer Easy Tagging and Bookmarking  

Intuitive Navigation and Dual Monitor Support

REPORTING AND EXPORTING Robust Reporting %   File  Breakout/Exception  Reports:  detail  processed  and  encrypted  data  with  metrics  per  custodian  or  across  matters.     %   De-­duplication  Reports     %   Search  Summary  details  when  the  search  took  place,  who  performed  it,  and  what  items  were  searched  per  custodian/asset.   %   Detailed  Search  Report  provides     names  of  files  that  had  hits,  how  many  total  hits  per  file,  hit  count  by  categor y,  keywords   (terms)  and  search  options  used,  what  filters  were  applied,  as  well  as  variations  of  keywords  that  were  used. TIFF and PDF or Create Industry Standard Load Files %   Additionally  produce  in  native  format  or  an  AD1  forensic  archive,  organized  by  custodian  or  as  a  single  instance,  with  options   to  preserve  the  original  folder  structure.   %   TIFF  and  PDF  on  the  fly   %   Load  files  supported  include  Summation,  Relativity,  Concordance,  EDRM  XML,  Ringtail,  iCONECT  and  Introspect.    

Customize the AD ECA dashboard to provide real-­time metrics.

Choose from a wealth of options when processing data.

   

$"'& &$*

#&"!4

#&"!5

#&"!6

    

         

     

#%"!")$##!







'$% !&$).'%&" , +"'&%







%"$"% !"$ &"!







'%&" ,"!% (%$$ %%"!%







&&&$%







 !+&%0" !-%#+  -!$)- $)%1







"$!% ! &('##"$&"$($7338+#%







&($&"$+ !&$&'&!&&"!







!"'##"$&







!'%&%/%"!#&$







(!$)& & &!







#"$&!"$"%%!-/'#&"!-*#"$&-&(&+-2$







#"$&'%&"!!(!,$







#"$& ""% &(%"$"$!%(! %







(!*#"$$)!!&$!







"$"%%!#&"!%0!/ '##"$&1







$!'$/'#&"!#&"!%&%"$'%&"! (







"!% (!'##"$&







'%&" , "*#"$&"!'$&"!







$& 0 .1($%&*#"$&







*#"$&! " #&%'##"$& * ($%







*#"$&' &(&%&%"$"%! 0. . 1. &&







 $"%%!!*#"$&&&'%







&+&"#!.).("'$"' !&







$ &("' !&)!)&!&%() !&$







"!'$$!&$"%%!-*#"$&!!&!+%%







'##"$&"$ '&#"!'$$!&%$







%&$'&$"%%!'%&$%









©2011 AccessData, Inc. All Rights Reserved. AccessData, Forensic Toolkit and FTK are registered trademarks owned by AccessData in the United States and other jurisdictions and may not be used without prior written permission. All other marks and brands may be claimed as the property of their respective owners.