Submit Search
Upload
Mark logic ediscovery and governance v1
•
0 likes
•
50 views
Fernando Mesa
Follow
MarkLogic for eDiscovery and Governance
Read less
Read more
Technology
Report
Share
Report
Share
1 of 19
Download now
Download to read offline
Recommended
How to Integrate Data and Protect Privacy
How to Integrate Data and Protect Privacy
DATAVERSITY
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
DATAVERSITY
European SharePoint Community - Hybrid Dilemma: Using Infrastructure as Infor...
European SharePoint Community - Hybrid Dilemma: Using Infrastructure as Infor...
Adam Levithan
Blueprint Series: Banking In The Cloud – Ultra-high Reliability Architectures
Blueprint Series: Banking In The Cloud – Ultra-high Reliability Architectures
Matt Stubbs
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
DATAVERSITY
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
Craig Adams
Enabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere Optim
Vineet
Building the enterprise data architecture
Building the enterprise data architecture
Costa Pissaris
Recommended
How to Integrate Data and Protect Privacy
How to Integrate Data and Protect Privacy
DATAVERSITY
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
DATAVERSITY
European SharePoint Community - Hybrid Dilemma: Using Infrastructure as Infor...
European SharePoint Community - Hybrid Dilemma: Using Infrastructure as Infor...
Adam Levithan
Blueprint Series: Banking In The Cloud – Ultra-high Reliability Architectures
Blueprint Series: Banking In The Cloud – Ultra-high Reliability Architectures
Matt Stubbs
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
DATAVERSITY
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
Craig Adams
Enabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere Optim
Vineet
Building the enterprise data architecture
Building the enterprise data architecture
Costa Pissaris
Working With Different Kinds of Data
Working With Different Kinds of Data
Embarcadero Technologies
Why Information Architecture is Vital for Office 365 and SharePoint
Why Information Architecture is Vital for Office 365 and SharePoint
J. Kevin Parker, CIP
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
J. David Morris
The Need to Know for Information Architects: Big Data to Big Information
The Need to Know for Information Architects: Big Data to Big Information
DATAVERSITY
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID Inc
Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?
boldonjames
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
DATAVERSITY
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
DATAVERSITY
General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017
Caserta
Why My Wife Loves Data Governance
Why My Wife Loves Data Governance
Paul Boal
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
DATAVERSITY
The Top 5 Factors to Consider When Choosing a Big Data Solution
The Top 5 Factors to Consider When Choosing a Big Data Solution
DATAVERSITY
Data Governance and Analytics
Data Governance and Analytics
Syed Jahanzaib Bin Hassan - JBH Syed
Data protection services lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
Aujas Networks Pvt. Ltd.
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
Vishal Bamba
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
eDiscoveryConsultant
8Reasons Tip Sheet_021216_v2
8Reasons Tip Sheet_021216_v2
Tim Goodwin
Data Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and Governance
Denodo
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Vishal Bamba
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix LLC
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
Inside Analysis
MarkLogic Semantic use cases
MarkLogic Semantic use cases
Fernando Mesa
More Related Content
What's hot
Working With Different Kinds of Data
Working With Different Kinds of Data
Embarcadero Technologies
Why Information Architecture is Vital for Office 365 and SharePoint
Why Information Architecture is Vital for Office 365 and SharePoint
J. Kevin Parker, CIP
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
J. David Morris
The Need to Know for Information Architects: Big Data to Big Information
The Need to Know for Information Architects: Big Data to Big Information
DATAVERSITY
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID Inc
Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?
boldonjames
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
DATAVERSITY
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
DATAVERSITY
General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017
Caserta
Why My Wife Loves Data Governance
Why My Wife Loves Data Governance
Paul Boal
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
DATAVERSITY
The Top 5 Factors to Consider When Choosing a Big Data Solution
The Top 5 Factors to Consider When Choosing a Big Data Solution
DATAVERSITY
Data Governance and Analytics
Data Governance and Analytics
Syed Jahanzaib Bin Hassan - JBH Syed
Data protection services lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
Aujas Networks Pvt. Ltd.
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
Vishal Bamba
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
eDiscoveryConsultant
8Reasons Tip Sheet_021216_v2
8Reasons Tip Sheet_021216_v2
Tim Goodwin
Data Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and Governance
Denodo
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Vishal Bamba
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix LLC
What's hot
(20)
Working With Different Kinds of Data
Working With Different Kinds of Data
Why Information Architecture is Vital for Office 365 and SharePoint
Why Information Architecture is Vital for Office 365 and SharePoint
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
The Need to Know for Information Architects: Big Data to Big Information
The Need to Know for Information Architects: Big Data to Big Information
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017
Why My Wife Loves Data Governance
Why My Wife Loves Data Governance
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
The Top 5 Factors to Consider When Choosing a Big Data Solution
The Top 5 Factors to Consider When Choosing a Big Data Solution
Data Governance and Analytics
Data Governance and Analytics
Data protection services lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
8Reasons Tip Sheet_021216_v2
8Reasons Tip Sheet_021216_v2
Data Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and Governance
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
Similar to Mark logic ediscovery and governance v1
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
Inside Analysis
MarkLogic Semantic use cases
MarkLogic Semantic use cases
Fernando Mesa
Fraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk Management
Fernando Mesa
What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021
DATAVERSITY
Embedded-ml(ai)applications - Bjoern Staender
Embedded-ml(ai)applications - Bjoern Staender
Dataconomy Media
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
Neo4j
Data Democratization for Faster Decision-making and Business Agility (ASEAN)
Data Democratization for Faster Decision-making and Business Agility (ASEAN)
Denodo
Govern and Protect Your End User Information
Govern and Protect Your End User Information
Denodo
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Denodo
Why Data Mesh Needs Data Virtualization (ASEAN)
Why Data Mesh Needs Data Virtualization (ASEAN)
Denodo
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Denodo
Oracle GoldenGate 12c - Real Time Access to Real Time Information
Oracle GoldenGate 12c - Real Time Access to Real Time Information
Asha BG
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines Webinar
Index Engines Inc.
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Denodo
Active Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with Alation
Databricks
Keynote Address: Changing Public Sector Through ICT-innovation
Keynote Address: Changing Public Sector Through ICT-innovation
Christian Wernberg-Tougaard
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
Sal Marcus
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
Jean-Michel Franco
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
GalaxyTech International
The Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data Governance
Eric Kavanagh
Similar to Mark logic ediscovery and governance v1
(20)
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
MarkLogic Semantic use cases
MarkLogic Semantic use cases
Fraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk Management
What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021
Embedded-ml(ai)applications - Bjoern Staender
Embedded-ml(ai)applications - Bjoern Staender
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
Data Democratization for Faster Decision-making and Business Agility (ASEAN)
Data Democratization for Faster Decision-making and Business Agility (ASEAN)
Govern and Protect Your End User Information
Govern and Protect Your End User Information
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Why Data Mesh Needs Data Virtualization (ASEAN)
Why Data Mesh Needs Data Virtualization (ASEAN)
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Oracle GoldenGate 12c - Real Time Access to Real Time Information
Oracle GoldenGate 12c - Real Time Access to Real Time Information
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines Webinar
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Active Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with Alation
Keynote Address: Changing Public Sector Through ICT-innovation
Keynote Address: Changing Public Sector Through ICT-innovation
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
The Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data Governance
Recently uploaded
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
null - The Open Security Community
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
XfilesPro
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
AndikSusilo4
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Recently uploaded
(20)
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Mark logic ediscovery and governance v1
1.
Slide 1 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. MarkLogic for eDiscovery Petascale search, query and analysis With defensible deletion
2.
Slide 2 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. eDiscovery/Governance Market Drivers § SEC requirements for brokerages to retain and supervise email, social media and other electronic communications (UBS) § Financial services regulations/risk and compliance (JP Morgan) § Security breach privacy laws in the U.S. and Germany that require customer notification of breach(google) § Anti-fraud, anti-bribery and anti-corruption laws in the U.S., U.K., Germany § Intellectual property mismanagement or misuse § Average Data Volumes exploded in the last ten years 2003 was 10Gb to 1Pb (100,000 bigger)
3.
Slide 3 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Governance Challenges § Lack of consistent adherence to policies across all information assets § Volume is exploding and current approaches won’t scale § Distilling policies into proactive automated rules and alerts difficult § Current approaches focus on single applications (email) instead of data § Need scale and transaction logging to be defensible! § Need a granular security model to put all assets in one solution § Data, policy enforcement and learning management should be integrated
4.
Slide 4 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Market Opportunity § The enterprise e-discovery software market generated $1.4 billion in total software vendor revenue in 2012 (82% of revenue in US) § By 2017 the e-discovery software market will be $2.9B § "Nontraditional" e-discovery vendors will continue to enter this market, creating market expansion through technology convergence and functionality overlap. Gartner Dec. 2012
5.
Slide 5 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Functionality § Realtime identification and collection § ETL/aggregate and process content § Ingest/Index quickly and cost effectively any data § Metadata catalog § Performance and scale § Search § Segment/classify/tag § Non responsive, privileged or escalate § Delete or promote to matter specific solution § Threading to speed review of only latest content § NLP and entity enrichment § Transactional integrity for defensible deletion (log everything) § Loose correlation across disparate dimensions § Policy management and alerting § Learning management and compliance
6.
Slide 6 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Software and Services § Restoration/Identification/Collection § MetaData catalog § Crack pst’s § Fiiltering/Conversion § De-dupe § De-Nisting § Threading § Build, train and enforce policies § Relate multiple contact info § Entity enrichment § Concept clustering, predictive coding § Export to EDRM XML § Review, produce, present
7.
Slide 7 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. E-Discovery Gartner Quadrant
8.
Slide 8 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Influencers/Partners § Data conversion/processing § DiscoverTape (Sullivan) § Trusted Data (Clark) § Oliver Group (Bessette) § eMag Solutions (Henn) § Renew Data (Blayney) § Index Engines (Williams) § Governance/Compliance/Risk/ eDiscovery Consulting § AlixPartners (Perfetti) § Alvarez and Marsal (Kindy) § Huron (Tierney and Bashir) § KPMG (Reichard) § Deloitte (DeSantis) § E and Y (Pannell) § Navigant (Post) § FTI (Brunner) § OEM’s/ISV’s § PureDiscovery (Copps) § Content Analyst (Michel) § SmartLogic (Gleason) § Index Engines (Williams) § Nuex (Chardack) § StoredIQ (Schellhase) § Proof Point (Steele) § Enterprise Vault (deSouza) § Acaveo (Bourgeois) § Equivio (Milo)
9.
Slide 9 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Efficiently getting to relevant data
10.
Slide 10 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Index all Content with MarkLogic Actionable Results § Filter & cull data to manageable data set § Export to review tools § Identify data for regulatory and governance § Retention classes can evolve with compliance regulations § Data integrity ensures preservation and defensible deletion. § Security with Encryption § Correlate email with accounting and other internal data sources (by person, time, subject etc…) Custom Applications Communications Search and Discover • Index across all data sources • Linear scale to Pb’s • Expedite investigation and litigation discoveries • Fast and accurate search • Improve productivity with single point of access to all information File SystemsDocument management E-mail Search and Discover Laptop/ Workstation
11.
Slide 11 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Flexible and Easy UI § High performance metadata catalogs § Full text universal search across all indexes § Search and facets designed for non-tech users § Library of visualization widgets § Promote responsive content for detailed processing, analysis, review and production § Visual Ad Hoc Dashboards with Tableau
12.
Slide 12 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Data Integrity Foundation for defensibility § Aggregate and log all data collection § ACID compliance for transactional integrity § Versioning, data compression and duplicate elimination § Role based security and encryption
13.
Slide 13 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Scalable Concept Clustering § Large databases § Queries with large number of terms and term weights
14.
Slide 14 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. RDF Triple Store for Linking § Multiple email addresses and user id’s for individuals § Contact name, title, location, roles § Related industry terms § Parties and Counter Parties
15.
Slide 15 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Range Indexes for Numerical Analysis § Dates from disparate data sources § Fast aggregates for numerical analysis § Library of statistical calculations § Any user defined custom analytical function
16.
Slide 16 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Multi Matter, Single Instance for GC § A majority of companies use multiple products to cover the whole process, but are looking to consolidate to handle every aspect of e-discovery in-house. § Interest in using information governance techniques and tools to control the amount of data that is kept by enterprises is also growing.
17.
Slide 17 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. eDiscovery Next Steps § Target Enterprises with large litigation holds § Tb Scale exceeds capabilities of traditional tools § Limited or simple processing requirements § Prospect values defensible deletion, scale or integration with other data § Target Roles § AGC in charge of data § Lead Paralegal § Compliance officer § IT that focuses on governance/compliance/eDiscovery § Sign referral agreements with influencers § Tape conversion § Strategic consultants § Key OEM’s § Recruit AE or PC with Governance wins
18.
Slide 18 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Influencers § Data conversion/processing § DiscoverTape (Sullivan) § Trusted Data (Clark) § Oliver Group (Bessette) § eMag Solutions (Henn) § Renew Data (Blayney) § Index Engines (Williams) § Governance/Compliance/Risk/ eDiscovery Consulting § AlixPartners (Perfetti) § Alvarez and Marsal (Kindy) § Huron (Tierney and Bashir) § KPMG (Reichard) § Deloitte (DeSantis) § E and Y (Pannell) § Navigant (Post) § FTI (Brunner) § Kroll (Casey) § Lexis Applied Discovery (Clark) § OEM’s/ISV’s § PureDiscovery § Content Analyst § Kcura Relativity (Sieja) § Lexis/Concordance § Index Engines (Williams) § Nuex (Chardack) § @Legal (Haresh/Paresh) § StoredIQ (Schellhase) § Proof Point (Steele) § Enterprise Vault (deSouza) § Acaveo (Bourgeois) § Equivio (Milo)
19.
Slide 19 Copyright
© 2012 MarkLogic® Corporation. All rights reserved. Lead Sources § www.complianceweek.com § www.thewhitecollarblog.com § http://www.sec.gov/spotlight/fcpa/fcpa-cases.shtml § Lexis AtVantage (legal biz dev service)
Download now