KEY POINTSQuickly highlight the relationships that matter, saving time, enabling a risk assessment to be made earlier in the cycleBy knowing who and what to investigate EARLY, our clients save an enormous amount of time and money downstream in the EDRM process.EXAMPLE – JP Morgan - always on log file analysis – 250,000 employees – identify custodians, dramatically reduced the number of pst’s and hence emails that need to be collected, preserved and analysed.Early Case Analysis and Assessment. How can you make a real assessment when you may not have all the right people, custodians, wrong data etc.The other methods just “tell you that their technology filter data sets down by 95% based on keywords etc” , but it is still looking at the data. One way the Catelas technology is being used for eDiscovery Cases is to analyzes log files from Exchange and other systems even before collecting any emails. The value comes from being able to make sure you have all the right suspects, custodians etc. upfront the first time. This allows functions such as Legal, Compliance, Risk and Information Security to understand both who knows who, how well and a chance to uncover non-obvious relationships, BEFORE a single email is ever collected and get a better handle of what data really needs to be collected. Normal methods of looking at content really may be (too big to look at all the emails, so some just look a snapshot –that still depends on your keywords or how good your search is)…that all changes with Catelas, because you can analyze log files (20GB may = 10-15 MM emails) and Catelas is the only ones doing that today. Avoid over collection and spoliation; preserve the right content by uncovering non-obvious relationships and activity
KEY POINTSThe first 10 days are critical – define the case strategy with clarity and convictionBy knowing what the case is about and who to collect and investigate EARLY.Case strategy is KEY – dismiss, settle, contest – allocate budget and resources
KEY POINTSQuickly highlight the relationships that matter, saving time, enabling a risk assessment to be made earlier in the cycleBy knowing who and what to investigate EARLY, our clients save an enormous amount of time and money downstream in the EDRM process.EXAMPLE – JP Morgan - always on log file analysis – 250,000 employees – identify custodians, dramatically reduced the number of pst’s and hence emails that need to be collected, preserved and analysed.Early Case Analysis and Assessment. How can you make a real assessment when you may not have all the right people, custodians, wrong data etc.The other methods just “tell you that their technology filter data sets down by 95% based on keywords etc” , but it is still looking at the data. One way the Catelas technology is being used for eDiscovery Cases is to analyzes log files from Exchange and other systems even before collecting any emails. The value comes from being able to make sure you have all the right suspects, custodians etc. upfront the first time. This allows functions such as Legal, Compliance, Risk and Information Security to understand both who knows who, how well and a chance to uncover non-obvious relationships, BEFORE a single email is ever collected and get a better handle of what data really needs to be collected. Normal methods of looking at content really may be (too big to look at all the emails, so some just look a snapshot –that still depends on your keywords or how good your search is)…that all changes with Catelas, because you can analyze log files (20GB may = 10-15 MM emails) and Catelas is the only ones doing that today. Avoid over collection and spoliation; preserve the right content by uncovering non-obvious relationships and activity