Presenting At The Texas Lawyer Magazine “Technology Summit” 9/24/14 | iseekdiscovery.com.

Slides:



Advertisements
Similar presentations
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP TRIM HP Information Management.
Advertisements

The Revolutionary Cloud Storage Network Symform Cloud Storage Network.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
E-Discovery for System Administrators Russell M. Shumway.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
Project Planning and Management in E-Discovery DAVID A. ELLIS – MAYER BROWN BROWNING E. MAREAN – DLA PIPER.
E-Discovery LIMITS ON E-DISCOVERY. No New Preservation Rule When does duty to preserve attach? Reasonably anticipated litigation. Audio sanctions.
1 Best Practices in Legal Holds Effectively Managing the e-Discovery Process and Associated Costs.
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
April 11-13, Session Title Presenters {Name} April 11-13, PRESENTED BY THE Managing E-Discovery in Small to.
Defensible Client File Collections 6 Common Roadblocks and Obstacles.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
1 © Copyright 2008 EMC Corporation. All rights reserved. Litigation Response Planning: eDiscovery Best Practices Stephen O’Leary Sr. eDiscovery and Compliance.
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
Agenda The Colligo Vision Unified Solutions for & Records Management Colligo Manager Colligo Contributor Pro Colligo Briefcase Colligo Administrator.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
The 4 Steps You Must Know Before Migrating Platforms Presented by: Jeff Tujetsch, VP of IBM Domino Development Denny Russell, Senior Product Specialist,
Doculogix, LLC. PTS (Project Tracking System) Know your business …stay informed.
10 Essential Security Measures PA Turnpike Commission.
Electronic Discovery (eDiscovery) Chad Meyer & John Vyhlidal ConAgra Foods.
New Data Regulation Law 201 CMR TJX Video.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Get Off of My I-Cloud: Role of Technology in Construction Practice Sanjay Kurian, Esq. Trent Walton, CTO U.S. Legal Support.
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
What’s New for IT Professionals in Microsoft® SharePoint® Server 2013 (Day 2) Sayed Ali (MCTS, MCITP, MCT, MCSA, MCSE ) Senior SharePoint.
Outlook Lesson 5 Managing Contacts Microsoft Office 2010 Advanced Cable / Morrison 1.
Licitware a forensic software tool designed to investigate computer crimes.
VS Anywhere. Visual Studio Industry Partner VS Anywhere NEXT STEPS Contact us at: Websitehttps://vsanywhere.com Blog- Facebook.
E-Discovery PA230: Unit 9.
Together we will accomplish great things! Merrill Legal Solutions Acquisition Update Confidential—Not For Distribution World-class service. Local commitment.
Wireless Password:  “The cloud” is real  Electronic data growth is rapid and pervasive  Employees use the cloud to conduct government work.
The EWMS Insurance Administration System. 9/24/2015POWERING TOTAL FINANCIAL MANAGEMENT2 Agenda Total Financial Management & Insurance The EWMS Insurance.
Marco Nasca Senior Director, Client Solutions TRANSFORMING DISCOVERY THROUGH DATA MANAGEMENT.
PowerPoint Lesson 10 Sharing and Delivering Presentations Microsoft Office 2010 Advanced Cable / Morrison 1.
Thank you for taking a few moments of your time to learn how representing InnoDraw Electronic Templating and Measuring can assist your customers in getting.
Nathan Walker building an ediscovery framework. armasv.org Objective Present an IT-centric perspective to consider when building an eDiscovery framework.
Rewriting the Law in the Digital Age
Computer Forensics Principles and Practices
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
2009 CHANGES IN CALIFORNIA DISCOVERY RULES The California Electronic Discovery Act Batya Swenson E-discovery Task Force
E-discovery
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
S-1 © RGP & UW-CISA 2010 Business & Technology Environment Summer 2010 Robert G Parker.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Document Management Service MaestroTec, Inc. D ocument M anagement S ervice Improve the way you manage your critical business documents.
Surviving eDiscovery: Technology Firm Perspective  Robert A. Cruz Sr. Director, eDiscovery Solutions, Proofpoint, Inc.
Requirements for a Retainer Agreement Start with a Written Contract! ALWAYS!
UNIVERSITY OF HOUSTON SUMMER III 2010 – 5297 E-DISCOVERY Vendors!
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
E-discovery Discussion. 2 Policies and Procedures Do you have a set of e-discovery policies and procedures? – Who is the lead for e-discovery efforts.
Archiving for E-Discovery and Retention Management Theodore S. Barassi, Esq. Group Product Manager E-Discovery and Information Risk.
E-Discovery And why it matters to a SSA. What is E-Discovery? E-Discovery is the process during litigation of discovering information relevant to litigation.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
SECURE DATA TRANSFER Melvin Freeman The Next Step Public Charter School.
When the law firm is the client Handling legal holds, document collections and productions of your own firm’s documents.
The Early Years until now .. Dr Allison Stanfield
Remote Collection What, When & Why.
VCS-413 VCE Practice Test Dumps
ECM for Legal & Law.
IT Preservation Holds and Public Information Requests
City & County of San Francisco Document Retrieval
On-Site Investigations
Presentation transcript:

Presenting At The Texas Lawyer Magazine “Technology Summit” 9/24/14 | iseekdiscovery.com

WANT TO CUT YOUR EDISCOVERY TIME IN HALF?

For starters, it’s a game-changer. iSEEK is an Intelligent Data Investigation Tool designed to target, collect and preserve electronically stored information. iSEEK helps identify key documents faster, removes human error from the equation, and controls your eDiscovery costs. WHAT IS ISEEK?

If hackers can do it in a day, why can’t your ESI consultants?

SAY HELLO TO YOUR NEW FORENSICS TEAM

Imploy iSEEK however you choose or traditional methods, thumb drive, shared folder, login script Receive results conveniently Via the Cloud, , or review tool Restrict access to retrieved data results Data is always 100% encrypted and all results can be stored in password protected containers HOW DOES IT WORK?

Analyze results to identify responsive evidence View hundreds of file types, search within retrieved results, create reports, and prepare for review in iVAULT No installation required No EDRM Certified Specialist needed Which means no room for human errors Obtain specific results at super speeds HOW DOES IT WORK?

ACCOMPLISH MORE IN THE EARLY STAGES OF EDISCOVERY.

ISEEK PROCESSES ALL COLLECTIONS GEEK-FREE 1.Legal hold 2.Preservation 3.Safe harbor All data generated or viewed remains 100% encrypted. It’s your data under your control.

WE ARE GOING TO TAKE A TEST DRIVE OF ISEEK AGAINST YOUR TOOLS. Mission: Find all non-searchable PDF files along with two individual last names within standard PST containers. Situation: Enron’s 2009 GPL corpus of 168 PST files

ToolProcess Hours (High / Low) Found Terms Automatically Found PDFs Human Interaction Time A7/3.5No020 min B9/3.5Yes010 min C6.5/3.25Some040 min D5/3.0Yes010 min iLOOK IX4/2.5Yes05 min THE RESULTS

ToolProcess Hours (High / Low) Found Terms Automatically Found PDFs Human Interaction Time A7/3.5No020 min B9/3.5Yes010 min C6.5/3.25Some040 min D5/3.0Yes010 min iLOOK IX4/2.5Yes05 min AND iSEEK? iSEEK56 min/37minYes1,8730 min

iSEEK ran in 1/3 the time it took the second best forensic tool. iSEEK found 100% of the requested data, or 200x the amount found by the competition. With only the use of the client’s CPU and NO human involvement, iSEEK completed the processing in minutes. Not hours. With iSEEK, this entire job could have been finished in THREE minutes in Enron’s office today.

LESS TIME EDISCOVERING MORE TIME CONQUERING.

THANK YOU! Visit iseekdiscovery.com today and take a free iSEEK 30 day 10 gig hosted Relativity Review courtesy of Innovative Litigation.

ISEEK’s partners and distributers specialize in electronic discovery and work to develop and lead the way in eDiscovery solutions for any sized firm, big or small. Developed by Perlustro | Distributed by Innovative Litigation ABOUT OUR PARTNERS