The assessment phase also allows us to develop a proper scope of the project and establish realistic goals for the investigation. Regardless if your case is part of existing litigation or is based on an internal investigation, it is important to define the investigation and establish a reasonable budget for the case.
Your E-Investigations lead investigator can also determine what resources you may need for your investigation. This may include a mixture of services including surveillance, backgrounds, and computer forensics. You can be rest assured that E-Investigations has the resources to cover all angles of your case.
Our on-demand hosted architecture supports large volumes of data and simultaneous users.
PRECISION
Proximity searching, fuzzy logic search, Boolean arguments – we have them. What is unique is our ability to test search effectiveness without the need to retrieve the results each time.
SECURITY
We believe that security is the foundation to every aspect of how we manage your data. We apply security practices from the ground up, and perform due diligence to maintain and update those practices as the threat landscape changes.
Once a E-Investigations El expert has obtained a forensically sound image of the device and the data has been culled, the next step in the process is analysis. Computer forensic analysis begins with our Enterprise Review System.
Our Enterprise Review System is designed to facilitate an intuitive and efficient review for projects of any size. Our clean, web-based user interface and highly scalable, enterprise-grade technology platform allows users to:
- Be up and running within minutes – with no plug-ins and minimal training
- Focus on documents rather than complex functionality
- Review files in TIFF, native, and PDF
- Search with powerful full-text and keyword functionality
- Customize tagging for content capture, analysis and workflows
- Rapidly reduce ESI volume through advanced culling filters directly on Enterprise Review System
- Search and manage files in any language with Unicode and foreign language support
- Create production sets for litigation, audits and investigations in multiple formats
After the computer forensic images have been culled and the non-essential program files, duplicates, and other non-essential data discarded, the relevant digital forensic information is uploaded into the EInvestigations e-Discovery program, which is a very in-depth and forensically sound resource. The client, other counsel that may get involved, and professional researchers can then use the same recovered data for analysis.
- Extraction
- Sorting
- Recovery
- Attack Identification
- Data Breach Analysis