SlideShare a Scribd company logo
1 of 16
1© Copyright 2009 EMC Corporation. All rights reserved.
EMC SourceOne
eDiscovery — Kazeon
The Importance of Application Connectors in
SourceOne eDiscovery - Kazeon
2© Copyright 2009 EMC Corporation. All rights reserved.
What is eDiscovery? Prudent Readiness…
Identify, collect, preserve, analyze, review,
and produce information when requested
Investigation LitigationPublic DisclosureAudit
3© Copyright 2009 EMC Corporation. All rights reserved.
Why is eDiscovery of ESI such a Challenge?
Sources
Format
Electronic Content
Cross-borderSpeed
Volume
4© Copyright 2009 EMC Corporation. All rights reserved.
The Costs of eDiscovery
10x
increased costs
to outsource
$1.5M
average cost
per incident
$34M
average annual
legal costs
89%
of companies
face litigation
$18M+
cost to review
1 TB of info
5© Copyright 2009 EMC Corporation. All rights reserved.
Integrated ESI Sources
E-mail Systems
Microsoft Exchange
Domino/Lotus Notes
PST/NSF personal archives
File Systems
Desktops
Laptops
CIFS/NFS File shares
Content Management &
Collaboration Systems
EMC Documentum
Microsoft SharePoint
Symantec Enterprise Vault
Early
Case
Assessment:
Extensive analysis,
searching and
first-pass review
for enterprise-wide
data resulting in
quick yet
comprehensive
assessment of
case.
SourceOne eDiscovery – Kazeon
6© Copyright 2009 EMC Corporation. All rights reserved.
Collection, Processing and Culling
ESI Source Data Collected Data
COLLECTION AND CULLING SOFTWARE
Cull-down
Deduplicate
Automated
Targeted
Collected Documents
+
Metadata
+
Verification Report
+
Search Query Report
Index-less
Forensically
Sound
LITIGATION SUPPORT OR IT
Laptops and
Desktops
File
Servers
E-mail
Servers
E-mail
Archives
PST/NSF
Files
Document
Management
Repositories
USB Drives
Legal Store
7© Copyright 2009 EMC Corporation. All rights reserved.
Application
Connectors
8© Copyright 2009 EMC Corporation. All rights reserved.
Access to Data Sources and Repositories
 Legal Discovery is all about finding
documents…..that vindicate or vilify.
 Where are Documents?
 In applications and repositories….but they all talk a
different language!
 A Connector allows our eDiscovery – Kazeon suite
to connect and talk to different applications and
repositories.
 Why is this Important – Easy Upsell
9© Copyright 2009 EMC Corporation. All rights reserved.
Email – Often the Smoking Gun!
 Microsoft Exchange and PDFs
 Lotus Domino – Notes and NSF
Email is the most sought after application in
Discovery motions in a litigation case.
10© Copyright 2009 EMC Corporation. All rights reserved.
Email Archives – The Needle in the Haystack
 SourceOne Archive
 Symantec Enterprise Vault
Archived emails are a close second and are now
routinely included in discovery motions.
11© Copyright 2009 EMC Corporation. All rights reserved.
Collaborative Tools – Fastest Growing
 Microsoft SharePoint
SharePoint is one of the fastest growing applications
within the Enterprise. Savvy Lawyers are including
it in discovery motions.
12© Copyright 2009 EMC Corporation. All rights reserved.
Laptops and Desktops
 Computers….
Laptops and Desktops are where electronic
documents are created….and where they are
found!
But, it is not straight forward to search and collect
from 100s much less 1,000s of laptops and
desktops.
13© Copyright 2009 EMC Corporation. All rights reserved.
File Shares – NAS…NAS …NAS & more NAS
 File Shares
Central file repositories, like Celerra and other NAS
storage systems, are prime targets for discovery
with oodles and oodles of documents.
But….again searching 10s to 100s of Terabytes is
challenging.
14© Copyright 2009 EMC Corporation. All rights reserved.
Take-a-ways
 Connectors connect our eDiscovery suite to more applications and
repositories
 Connectors are an easy upsell
 The more applications and repositories we can collect from the more
eDiscovery and Storage customers buy
15© Copyright 2009 EMC Corporation. All rights reserved.
For more information
David Morris – david.morris@emc.com
www.kazeon.com/discover
Apps Preso

More Related Content

Similar to Apps Preso

ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallJ. David Morris
 
Arma Slide Deck 17novb09
Arma Slide Deck 17novb09Arma Slide Deck 17novb09
Arma Slide Deck 17novb09Gordon Hoke
 
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Novell
 
Email Management & E-forms
Email Management & E-formsEmail Management & E-forms
Email Management & E-formsCarol Hagen
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesDaegis
 
Esquire Edrm Q Fall 08 Article+Ad
Esquire Edrm Q Fall 08 Article+AdEsquire Edrm Q Fall 08 Article+Ad
Esquire Edrm Q Fall 08 Article+Adlarrylieb
 
Merit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source SoftwareMerit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source Softwaremeritnorthwest
 
The Application Layer ...
The Application Layer                                                        ...The Application Layer                                                        ...
The Application Layer ...ebrahimelamin20
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internetcoastalgraphics
 
Sirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSumit Tambe
 
Information Centric Network And Developing Channel Coding...
Information Centric Network And Developing Channel Coding...Information Centric Network And Developing Channel Coding...
Information Centric Network And Developing Channel Coding...Kim Moore
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
Team 4 Presents: The Client Server Model
Team 4 Presents: The Client Server Model Team 4 Presents: The Client Server Model
Team 4 Presents: The Client Server Model anniekate93
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
Tempo - Mobile access with Governance
Tempo - Mobile access with GovernanceTempo - Mobile access with Governance
Tempo - Mobile access with GovernanceGabe Faraone
 
eDiscovery Turf Wars: Legal v. IT
eDiscovery Turf Wars: Legal v. ITeDiscovery Turf Wars: Legal v. IT
eDiscovery Turf Wars: Legal v. ITJ. David Morris
 
Garbage collection and the write cliff-techdocs
Garbage collection and the write cliff-techdocsGarbage collection and the write cliff-techdocs
Garbage collection and the write cliff-techdocsMichael Martin
 
Digital Forensics Research & Examination
Digital Forensics Research & ExaminationDigital Forensics Research & Examination
Digital Forensics Research & ExaminationforensicEmailAnalysis
 

Similar to Apps Preso (20)

ARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the FirewallARMA - eDiscovery Behind the Firewall
ARMA - eDiscovery Behind the Firewall
 
Arma Slide Deck 17novb09
Arma Slide Deck 17novb09Arma Slide Deck 17novb09
Arma Slide Deck 17novb09
 
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
 
Email Management & E-forms
Email Management & E-formsEmail Management & E-forms
Email Management & E-forms
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus Notes
 
Koyushev
KoyushevKoyushev
Koyushev
 
Esquire Edrm Q Fall 08 Article+Ad
Esquire Edrm Q Fall 08 Article+AdEsquire Edrm Q Fall 08 Article+Ad
Esquire Edrm Q Fall 08 Article+Ad
 
Merit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source SoftwareMerit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source Software
 
The Application Layer ...
The Application Layer                                                        ...The Application Layer                                                        ...
The Application Layer ...
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Sirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicro
 
Information Centric Network And Developing Channel Coding...
Information Centric Network And Developing Channel Coding...Information Centric Network And Developing Channel Coding...
Information Centric Network And Developing Channel Coding...
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Team 4 Presents: The Client Server Model
Team 4 Presents: The Client Server Model Team 4 Presents: The Client Server Model
Team 4 Presents: The Client Server Model
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
EDI 2009 Information Everywhere: Understanding New Technologies & Coping with...
EDI 2009 Information Everywhere: Understanding New Technologies & Coping with...EDI 2009 Information Everywhere: Understanding New Technologies & Coping with...
EDI 2009 Information Everywhere: Understanding New Technologies & Coping with...
 
Tempo - Mobile access with Governance
Tempo - Mobile access with GovernanceTempo - Mobile access with Governance
Tempo - Mobile access with Governance
 
eDiscovery Turf Wars: Legal v. IT
eDiscovery Turf Wars: Legal v. ITeDiscovery Turf Wars: Legal v. IT
eDiscovery Turf Wars: Legal v. IT
 
Garbage collection and the write cliff-techdocs
Garbage collection and the write cliff-techdocsGarbage collection and the write cliff-techdocs
Garbage collection and the write cliff-techdocs
 
Digital Forensics Research & Examination
Digital Forensics Research & ExaminationDigital Forensics Research & Examination
Digital Forensics Research & Examination
 

More from J. David Morris

Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...J. David Morris
 
Dr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceDr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceJ. David Morris
 
Wayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarWayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarJ. David Morris
 
Laura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersLaura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersJ. David Morris
 
Cetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsCetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsJ. David Morris
 
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...J. David Morris
 
IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.J. David Morris
 
The Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryThe Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryJ. David Morris
 
Overcoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryOvercoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryJ. David Morris
 
Esoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarEsoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarJ. David Morris
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...J. David Morris
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011J. David Morris
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!J. David Morris
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border DisputesJ. David Morris
 
eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011J. David Morris
 
Mc Carterand English 06152010 F
Mc Carterand English 06152010 FMc Carterand English 06152010 F
Mc Carterand English 06152010 FJ. David Morris
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureJ. David Morris
 

More from J. David Morris (20)

Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
 
Dr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceDr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer Experience
 
Wayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarWayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinar
 
Laura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersLaura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big Answers
 
Cetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsCetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive Analytics
 
KMWorld Presentation
KMWorld PresentationKMWorld Presentation
KMWorld Presentation
 
eDiscovery Infographic
eDiscovery InfographiceDiscovery Infographic
eDiscovery Infographic
 
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
 
IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.
 
The Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryThe Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscovery
 
Overcoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryOvercoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscovery
 
Esoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarEsoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinar
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border Disputes
 
Pardon the eDiscovery
Pardon the eDiscoveryPardon the eDiscovery
Pardon the eDiscovery
 
eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011
 
Mc Carterand English 06152010 F
Mc Carterand English 06152010 FMc Carterand English 06152010 F
Mc Carterand English 06152010 F
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosure
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Apps Preso

  • 1. 1© Copyright 2009 EMC Corporation. All rights reserved. EMC SourceOne eDiscovery — Kazeon The Importance of Application Connectors in SourceOne eDiscovery - Kazeon
  • 2. 2© Copyright 2009 EMC Corporation. All rights reserved. What is eDiscovery? Prudent Readiness… Identify, collect, preserve, analyze, review, and produce information when requested Investigation LitigationPublic DisclosureAudit
  • 3. 3© Copyright 2009 EMC Corporation. All rights reserved. Why is eDiscovery of ESI such a Challenge? Sources Format Electronic Content Cross-borderSpeed Volume
  • 4. 4© Copyright 2009 EMC Corporation. All rights reserved. The Costs of eDiscovery 10x increased costs to outsource $1.5M average cost per incident $34M average annual legal costs 89% of companies face litigation $18M+ cost to review 1 TB of info
  • 5. 5© Copyright 2009 EMC Corporation. All rights reserved. Integrated ESI Sources E-mail Systems Microsoft Exchange Domino/Lotus Notes PST/NSF personal archives File Systems Desktops Laptops CIFS/NFS File shares Content Management & Collaboration Systems EMC Documentum Microsoft SharePoint Symantec Enterprise Vault Early Case Assessment: Extensive analysis, searching and first-pass review for enterprise-wide data resulting in quick yet comprehensive assessment of case. SourceOne eDiscovery – Kazeon
  • 6. 6© Copyright 2009 EMC Corporation. All rights reserved. Collection, Processing and Culling ESI Source Data Collected Data COLLECTION AND CULLING SOFTWARE Cull-down Deduplicate Automated Targeted Collected Documents + Metadata + Verification Report + Search Query Report Index-less Forensically Sound LITIGATION SUPPORT OR IT Laptops and Desktops File Servers E-mail Servers E-mail Archives PST/NSF Files Document Management Repositories USB Drives Legal Store
  • 7. 7© Copyright 2009 EMC Corporation. All rights reserved. Application Connectors
  • 8. 8© Copyright 2009 EMC Corporation. All rights reserved. Access to Data Sources and Repositories  Legal Discovery is all about finding documents…..that vindicate or vilify.  Where are Documents?  In applications and repositories….but they all talk a different language!  A Connector allows our eDiscovery – Kazeon suite to connect and talk to different applications and repositories.  Why is this Important – Easy Upsell
  • 9. 9© Copyright 2009 EMC Corporation. All rights reserved. Email – Often the Smoking Gun!  Microsoft Exchange and PDFs  Lotus Domino – Notes and NSF Email is the most sought after application in Discovery motions in a litigation case.
  • 10. 10© Copyright 2009 EMC Corporation. All rights reserved. Email Archives – The Needle in the Haystack  SourceOne Archive  Symantec Enterprise Vault Archived emails are a close second and are now routinely included in discovery motions.
  • 11. 11© Copyright 2009 EMC Corporation. All rights reserved. Collaborative Tools – Fastest Growing  Microsoft SharePoint SharePoint is one of the fastest growing applications within the Enterprise. Savvy Lawyers are including it in discovery motions.
  • 12. 12© Copyright 2009 EMC Corporation. All rights reserved. Laptops and Desktops  Computers…. Laptops and Desktops are where electronic documents are created….and where they are found! But, it is not straight forward to search and collect from 100s much less 1,000s of laptops and desktops.
  • 13. 13© Copyright 2009 EMC Corporation. All rights reserved. File Shares – NAS…NAS …NAS & more NAS  File Shares Central file repositories, like Celerra and other NAS storage systems, are prime targets for discovery with oodles and oodles of documents. But….again searching 10s to 100s of Terabytes is challenging.
  • 14. 14© Copyright 2009 EMC Corporation. All rights reserved. Take-a-ways  Connectors connect our eDiscovery suite to more applications and repositories  Connectors are an easy upsell  The more applications and repositories we can collect from the more eDiscovery and Storage customers buy
  • 15. 15© Copyright 2009 EMC Corporation. All rights reserved. For more information David Morris – david.morris@emc.com www.kazeon.com/discover

Editor's Notes

  1. Note to Presenter: Present to customers and prospects to provide an overview of the EMC SourceOne family with a focus on ways to lower cost and risk through in-house eDiscovery products and solution.
  2. So let’s start off by defining Discovery….. Discovery is the ability to identify, collect, preserve, analyze, review and produce information when requested. In the United States, this process is known as electronic Discovery or eDiscovery. In the U.K. for example, it is know as eDisclosure. Regardless of how you label it, this process is relevant whether its part of an internal investigation, an audit, public disclosure request or litigation. Therefore, this process of discovering and producing information is relevant regardless of what part of the globe you do business in.
  3. So why is the discovery of electronically stored information such a challenge? Today, we communicate and collaborate with colleagues and partners faster and more globally than ever. The volume of electronic information is growing exponentially The speed at which information is exchanged is faster than ever before Electronic information encompasses a vast array of formats - from e-mail, to instant and text messages, messages, electronic documents, even blogs and wikis And this variety of electronic information is exchanged across geographic borders seamlessly as business is conducted And finally, there are numerous sources of information – laptops, desktops, file shares, e-mail servers, content management and archiving systems, collaboration systems and even USB drives. In today’s business world, the focus is on the content not the container. We exchange information quickly and seamlessly without regard to where it is stored or managed.
  4. There are compelling statistics about eDiscovery. 89% of companies face litigation … and nearly all companies have some kind of internal investigation or audit at any given point in time. With average costs of incidents being $1.5M it’s important to have cost containment strategies and repeatability. Further, the costs of outsourcing, not to mention the resulting lack of control, are reasons to strongly consider deploying in-house eDiscovery technology.
  5. Collection is often a primary challenge in corporations. IT is typically tasked with performing collections and they face the following two challenges most commonly: ESI is dispersed enterprise-wide and IT has no/limited visibility into what content lies where Collection is not done in a targeted fashion thereby leading to high costs (redundant storage of TBs) and liabilities (over-collection means preserving more content than necessary and being responsible for it’s sanctity) Targeted collection is required for an intelligent collection and resulting processing/culling. Processing and culling of data means a smart way of filtering out unnecessary/irrelevant information for that specific case or situation. This requires proper knowledge of that that ESI contains. Moreover the index resulting from the process has to be light-weight and easy to manage. Finally, detailed reporting on the whole process is critical to defensibility and transparency. More details on the following slide.
  6. EMC SourceOne eDiscovery – Kazeon is the perfect in-house eDiscovery product that provides capabilities that dramatically reduce costs, eliminate risk, provide transparency of process, is easy to deploy and provides the widest range of capabilities especially in the middle of the EDRM framework which pose the most amount of challenge to IT and Legal environments. In all, the product provides Early Case Assessment and First-pass Review capabilities to empower in-house counsel to make intelligent decisions about their litigations and/or internal investigations and audits.
  7. EMC SourceOne eDiscovery – Kazeon is the perfect in-house eDiscovery product that provides capabilities that dramatically reduce costs, eliminate risk, provide transparency of process, is easy to deploy and provides the widest range of capabilities especially in the middle of the EDRM framework which pose the most amount of challenge to IT and Legal environments. In all, the product provides Early Case Assessment and First-pass Review capabilities to empower in-house counsel to make intelligent decisions about their litigations and/or internal investigations and audits.
  8. EMC SourceOne eDiscovery – Kazeon is the perfect in-house eDiscovery product that provides capabilities that dramatically reduce costs, eliminate risk, provide transparency of process, is easy to deploy and provides the widest range of capabilities especially in the middle of the EDRM framework which pose the most amount of challenge to IT and Legal environments. In all, the product provides Early Case Assessment and First-pass Review capabilities to empower in-house counsel to make intelligent decisions about their litigations and/or internal investigations and audits.
  9. EMC SourceOne eDiscovery – Kazeon is the perfect in-house eDiscovery product that provides capabilities that dramatically reduce costs, eliminate risk, provide transparency of process, is easy to deploy and provides the widest range of capabilities especially in the middle of the EDRM framework which pose the most amount of challenge to IT and Legal environments. In all, the product provides Early Case Assessment and First-pass Review capabilities to empower in-house counsel to make intelligent decisions about their litigations and/or internal investigations and audits.
  10. EMC SourceOne eDiscovery – Kazeon is the perfect in-house eDiscovery product that provides capabilities that dramatically reduce costs, eliminate risk, provide transparency of process, is easy to deploy and provides the widest range of capabilities especially in the middle of the EDRM framework which pose the most amount of challenge to IT and Legal environments. In all, the product provides Early Case Assessment and First-pass Review capabilities to empower in-house counsel to make intelligent decisions about their litigations and/or internal investigations and audits.
  11. EMC SourceOne eDiscovery – Kazeon is the perfect in-house eDiscovery product that provides capabilities that dramatically reduce costs, eliminate risk, provide transparency of process, is easy to deploy and provides the widest range of capabilities especially in the middle of the EDRM framework which pose the most amount of challenge to IT and Legal environments. In all, the product provides Early Case Assessment and First-pass Review capabilities to empower in-house counsel to make intelligent decisions about their litigations and/or internal investigations and audits.
  12. Thank you.