SlideShare a Scribd company logo
1 of 36
Kazeon Confidential - DO NOT DISTRIBUTE
Winning in Court: Authenticity and
Admissibility of Electronic Data
Kazeon Confidential - DO NOT DISTRIBUTE
Agenda for Today
 Key Challenges of eDiscovery Today
 Questions for Consideration
 Customer Requirements
 Overview of Kazeon Solution
 Q&A
2
Kazeon Confidential - DO NOT DISTRIBUTE
Only 20% of
companies are
prepared for
eDiscovery
issues
70% of
Discovery
costs are in
attorney review
Attorney
Review
80% of ESI
resides on
laptops, file
shares and email
systems
Digital
Proliferation
Average cost
of single
eDiscovery
case is $1.5M
Cost
Fines or Jail
Time for
Corporate
Officers
$ Millions in
fines for
inadequate or
incomplete
data
Challenges of eDiscovery
++
++
Sources: Taneja Group, Gartner Group,
ESG, Ponemon Institute
Escalating
Costs
Increasing
Scrutiny
and Risk
Preparation Criminal
Actions
Fines
Kazeon Confidential - DO NOT DISTRIBUTE
eDiscovery: Are You Prepared?
 U.S. Federal Rules of Civil Procedure (FRCP) specify
that electronically stored information (ESI) is discoverable
– Ensures no surprises in court, everyone is prepared and each
party knows what the other has
– Pretrial resolution strongly encouraged; both parties can evaluate
strength of other’s case
 However…
– 63% have been asked to perform legal discovery
request (increase of 57% in 1 year)
– Only 47% say their “somewhat comfortable”
while 10% are not at all comfortable
– Less than 20% of companies claim to be
prepared for eDiscovery Issues
– Average cost of eDiscovery case is $1.5M
4
Kazeon Confidential - DO NOT DISTRIBUTE
FRCP 26 - Discovery
 December 2006 Update
– Handles discovery of electronic documents
– Rules 16, 26, 33, 34, 37 and 45
 26(a) Initial Discovery
– Initial discovery of ESI data sources and making available to all parties
 26(f) Meet and Confer / Discovery Plan
– Meet and Confer Session – understand each other’s defenses, discoverable
material, develop discovery plan, seek settlement
– Discovery Plan: what information each party will make available, in what form,
when and any privileged statement
– Rule 16 scheduling conference; parties get organized to provide for efficient
process and facilitate settlement
5
Kazeon Confidential - DO NOT DISTRIBUTE
FRCP 26(f) - Timeline
 Meet and Confer Session
– As soon as practical after lodging suite (usually within 30-90 days)
– At least 21 days before Rule 16 scheduling conference
 Deliver initial disclosures to other party within 14 days of
Rule 26(f) Meet and Confer session
 Submit discovery plan to court within 14 days of Rule 26(f)
Meet and Confer Session
 Hold Rule 16 scheduling conference with 120 days of
lodging suit
6
Kazeon Confidential - DO NOT DISTRIBUTE
Authenticity and Forensics
Historical Approach to Forensics
 Image copy of hard drives or data stored on servers
 High cost and big data management problems
– Average Cost $2,000 - $3,500 per drive
– Duplication of data in down-stream review
7
Experts urge caution in using Forensic Imaging for
Civil Cases
 A “forensically sound” copy of a file preserves
details of its chain of custody while accompanying
metadata
 A copy/move activity records information about the
file, such as when it was written, ownership, times it
had been “touched”, location
 Validation that it is exact copy
Kazeon Confidential - DO NOT DISTRIBUTE
Advise from Experts
8
http://www.thesedonaconference.org/content/miscFiles/TSC_PRINCP_2nd_ed_607.pdf
…making forensic image backups of computers is only the first step of an expensive,
complex, and difficult process of data analysis that can divert litigation into side
issues and satellite disputes involving the interpretation of potentially ambiguous
forensic evidence
…it should not be required unless exceptional circumstances warrant the
extraordinary cost and burden
…protective measures that take into account privacy rights, attorney-client privilege,
and the need to separate out and ignore non-relevant information
Kazeon Confidential - DO NOT DISTRIBUTE
Key Questions for Consideration
 Do I know where all potentially
responsive data resides and can I
quickly find it?
 How do I know if what is collected is
complete and accurate?
 How can I ensure that information is
not altered to avoid spoliation?
 How to cull down only relevant data
and minimize legal review time and
cost?
 How do I ensure what I submit as
responsive is authentic and how do I
prove it?
9
Kazeon Confidential - DO NOT DISTRIBUTE
What Customers are Asking For…
 Business Requirements
– Efficiency
• Reduce cost with more efficient in-
house data collection, analysis and
preservation
– Speed of Resolution
• Improve analysis and speed to
resolution with faster preservation
and processing
– Downstream Savings
• Create downstream savings by
sending single copy and only
relevant content for legal review
– Reduced Risk
• Improve ability to implement and
manage litigation holds on ESI at
data source with complete and
accurate results
 Technical Requirements
– Automation
• Reduce manual eDiscovery process with
transparency to operations
– Defensible and Auditable
• Defensible, repeatable and auditable process
– Control
• Gain control of unmanaged and potentially
responsive data in a secured infrastructure
– Enterprise-Wide Coverage
• Enterprise-wide coverage of ESI and Data Map
with single View
10
Kazeon Confidential - DO NOT DISTRIBUTE
Kazeon Solution for eDiscovery
 Enables Corporate Legal and IT teams to:
– Identify, classify, manage and preserve
information according to business value and
risk
– Respond rapidly and efficiently to litigation,
investigation, or compliance requirements
– Minimize cost of electronic discovery while
mitigation organization risk
– Enable forensically-sound, defensible,
auditable and complete discovery
11
Kazeon Confidential - DO NOT DISTRIBUTE
Electronic Discovery Reference Model (EDRM)
12
Kazeon provides solutions for both Proactive
and Reactive eDiscovery
Information
Management
VOLUME
Source: EDRM.NET
Proactive eDiscovery
Identification
Preservation
Collection
Processing
Review
Analysis
Production Presentation
RELEVANCE
Reactive eDiscovery
Kazeon Confidential - DO NOT DISTRIBUTE
Kazeon Proactive eDiscovery
13
Information
Management
VOLUME
Source: EDRM.NET
Proactive eDiscovery
Identification
Preservation
Collection
Processing
Review
Analysis
Production Presentation
RELEVANCE
Reactive eDiscovery
Information Discovery
• Visibility of all information
assets
• Data map of enterprise data
• Custodian maps
• Federated view across
enterprise
Indexing and
Classification
• Automated indexing and
classification
• Auto or user-defined tagging
• Classification based on risk
and value
• Associated appropriate
policies (retention, legal hold,
disposition, encryption)
Proactive Management
• Manage and monitor
information assets
• Archive and migrate data into
ECM, Email Archive and
Records Mgmt
• Modify policies as appropriate
Policy Enforcement
• Apply and enforce policies
(retention, disposition, etc.)
• Create auditable and
defensible process
Kazeon Proactive eDiscovery
Kazeon Confidential - DO NOT DISTRIBUTE
Kazeon Reactive eDiscovery
14
Identification
Preservation
Collection
Processing
Review
Analysis
VOLUME
Source: EDRM.NET
RELEVANCE
Information
Management
Production Presentation
Proactive eDiscovery Reactive eDiscovery
Identification
• Comprehensive data
maps
• Custodian reports
• Enterprise coverage
Targeted
Collection
• Custodian,mailbox,
laptop and file shrs
• Keyword, date range
based collection
• Collected data copied
and preserved
Preservation
• In-place legal hold
and release
• Legal hold on
collected data
• Support for hold
repositories
(Enterprise Vault,
NetApp SnapLock)
In-House
Processing
• Indexing collected ESI
• De-duplication,
system file culling
• Exception reporting
Analysis
• Early case
assessment
• Email threading
• Keyword, date range,
boolean search
Review
• Native or text review
• Document coding
• Export (native format,
metadata, content
hash)
Kazeon Reactive eDiscovery
Kazeon = Repeatable Business Process with Standardized Tools
Kazeon Confidential - DO NOT DISTRIBUTE
Kazeon Legal Discovery Solution
 As part of Kazeon’s eDiscovery portfolio, the Legal Discovery Solution
automates the discovery, classification, searching, reporting and ability to take
action on potentially responsive information scattered across the network
TECHNOLOGYWORKFLOW
Search Classify Act
 Scan Network, desktop,
file shares, remote
offices, endpoint laptops
 Hundreds of file formats
 Create data map
 Single-Step Collection
from all locations
 Content-based
collection
 In-place Legal Hold or at
Target
 Advanced Search
 Boolean, Wildcard,
fuzzy, proximity, range,
boosting, grouping
 Combine text &
metadata attributes
 Analyze summary and
drilldown views
 Predefined and
customizable reports
 Report by date, content,
custodian or user
defined fields
 Quarantine, move, copy,
protect, delete, encrypt
 Export to industry
standard formats
 Monitor & ongoing
Auditing
Legal Discovery Solution
Discover
Kazeon Confidential - DO NOT DISTRIBUTE
 Basic metadata or full-
text scans
 Automated scan/rescan
for incremental updates
(proactive)
 “One-step” process for
targeted collection
(reactive)
 Transparent to end
users
16
Discovery of ESI Sources
Proactive and Reactive
discovery of ESI Sources
Kazeon Confidential - DO NOT DISTRIBUTE
Discovery of ESI Sources
 Supports all file systems, group shares, desktop
workstations, remote laptops, email systems and
document and backup archives
 Minimal impact on operational performance (out-of-
band)
 Supports over 400 file and document formats
Automatically discovers and
scans network devices for
further review and analysis
Server or Appliance
Kazeon Confidential - DO NOT DISTRIBUTE
Laptop/Desktop Collection
 Agent-less scanning for laptops and desktops
 Scan profiles exclude windows binaries and
applications
 Checkpoint & auto-restart for efficient scanning
 Supports dynamic connects and disconnects
 Unique preview capability to view file text when
laptop is disconnected from the network
Remote Office Edition
Laptops and Desktops
Kazeon Cluster
Eliminate manual desktop
collection and over-collection
Kazeon Confidential - DO NOT DISTRIBUTE
How Collection Works…
19
1 Discover or Target
specific sources 2 Initiate “Single-Step”
Collection & designate
Target
3 Refine Search Criteria
for greater granularity
Source
Target
Exclude Windows
Files, Directories, etc.
Data Range
Key Words
Email Sender
4 Create and View
Discovery Report
Name Report
Select Columns for Summary
and Detail Reports
Kazeon Confidential - DO NOT DISTRIBUTE
Additional Search Capabilities
 Advanced search includes:
– Keyword (e.g. confidential, financial
projections, financial projections)
– Phrase (e.g. “guaranteed revenue return”)
– Boolean (e.g. word1 AND word2) OR (my
phrase) – word3)
– Wildcard (e.g. filename: b?g)
– Fuzzy (e.g. roam~.8)
– Proximity (e.g. word1, word2 ~10)
– Range (e.g. mtime: [01/01/2008 TO
02/22/08]
– Boosting (e.g. word1^5 word2)
– Fielded (e.g. owner: john smith)
 Federated search and reporting for
large environments
 Email and user-defined templates
Advanced Search using Google-like
search engine with full integration with
authentication infrastructure
Federated Search
and Reporting
Kazeon Confidential - DO NOT DISTRIBUTE
FRCP 26(a) and 26(f)
 26(a) Initial Discovery
– Initial discovery of ESI data sources
and making available to all parties
 26(f) Meet and Confer
– understand each other’s defenses,
discoverable material, develop
discovery plan, seek settlement
– Discovery Plan: what information each
party will make available, in what form,
when and any privileged statement
– Rule 16 scheduling conference; parties
get organized to provide for efficient
process and facilitate settlement
21
Collection and Culling to create relevant Data Map
for quick preparation in initial Discovery and
preparation for Meet and Confer
Case555 - Data Map by Custodian
ESI Data Map - By Type or Group
Kazeon Confidential - DO NOT DISTRIBUTE
In-House Processing
Processing of ESI to cull-down
to relevant results
 Auto-coding to cull-down ESI
– Attorney-Client privileged documents
– Personal e-mails
– Company Announcements
– Rule based classification and re-
classification
– Document preview
– Sophisticated tagging identifies
“responsive, privileged…” docs
– De-duplication
 Composite object break-
downs
– .PST files down to individual emails
and attachments
– .ZIP multiple file archives
– Early Case Assessment based on
Collection
– Any exceptions found during the
culling process are reported for
appropriate action
Kazeon Confidential - DO NOT DISTRIBUTE
Preservation
Copy culled ESI to hold
repositories (Enterprise Vault,
NetApp SnapLock, secured
File Shares)
Removal of Duplications
Preservation of Source
Hierarchy
Preservation of Timestamps
(creation, access, modified
times, etc)
Something about authenticity
of copied data (hash values?)
After files have been culled, the next step is to take action on the results to ensure
preservation of relevant data and protect against spoliation
Kazeon Confidential - DO NOT DISTRIBUTE
Legal Holds
 In-place Legal Hold or at Target
 Forensically-sound copies maintain
chain of custody
 Preserved file attributes, metadata,
hierarchy, revisions and timestamps
 Preservation of original file-path folder
structure (source)
 Integrates with Archive Repositories
such as Symantec Enterprise Vault
 Continuous protection by automatically
scanning and preserving new files
After files have been culled, the next step
is to take action on the results to ensure
preservation of relevant data and protect
against spoliation
Secondary File Share
Compliant Storage
Compliance DataReference Data
(NetApp NearStore)
Enterprise Vault,
NetApp SnapLock
COPY to secondary storage or to repository
Kazeon Confidential - DO NOT DISTRIBUTE
Tagging Information
Customizable Tags Applied to
Relevant Data;
– Responsive
– Privileged
– Reviewed
– On Legal Hold
– User-defined
Quickly identifying and tag
privileged information for
Meet and Confer /
Discovery Plan – Privileged
Statement
After files have been culled, the next step is to take action on the results to ensure
preservation of relevant data and protect against spoliation
Tagged as:
Responsive
Kazeon Confidential - DO NOT DISTRIBUTE
Authenticity and Auditing
 Standard Audit Reports
 System Auditing
– All user and system activity with
information about who did what when
– User login
– OS startup & shutdown, cluster
startup and shutdown, reboots, and
AD configuration changes
 Data Auditing
– Search Query and Report
– File history by Source (history of
actions on a file/email/attachment)
• Who, when, what, how, from, to,
input, output
• Object path, Owner, Timestamps,
Size
Full Auditing of System and Data Activity and reporting to
Rules of Evidence
Kazeon Confidential - DO NOT DISTRIBUTE
Content Analytics Reports
 Analyze summary and drill-down views
 Analysis by date, content, custodian or user defined fields
 Export to industry standard formats (XML, CSV, PST, ZIP)
40+ standard reports or easily
create custom reports
Kazeon Confidential - DO NOT DISTRIBUTE
Analytics: Matter Management
 Analyze by Case, Legal Exception or Type of Document
 Take Action directly from Search or Reports
40+ standard profiles or easily
generated custom profiles
Kazeon Confidential - DO NOT DISTRIBUTE 29
Review Analytics
Kazeon Confidential - DO NOT DISTRIBUTE 30
Review and Production
 Produce de-duplicated, culled and pre-reviewed data for further legal review
 Export search results to native format or CSV, download to PST or ZIP
 Kazeon Hold Location used by downstream legal review tool for further legal
review and production (Attenex, Summation, Concordance)
Select specific files or
entire Result Set for
Download to ZIP. Emails
export to PST format
Export selected search /
report rows to XML or CSV
format
Kazeon Confidential - DO NOT DISTRIBUTE
Complete Enterprise Coverage
 Enterprise-wide deployment including data center, remote offices and mobile users
 Supports all file systems, group shares, desktop workstations, remote laptops, email
systems and document, email and backup archives
 Minimal impact on operational performance (out-of-band and agent-less)
Exchange
Servers
Email
Archives
Document
Archives
Encrypted
Storage
File Shares
Backup
Archives
Desktops, Remote Offices and
Laptops
PST
Remote Offices
WAN
Desktops, File
Servers
Data Centers
Information Server
(Software-Only or
Appliance)
No IT Personnel
IT Personnel
Mobile UsersInternet
Kazeon Confidential - DO NOT DISTRIBUTE
Federated Enterprise Deployment over WAN
Regional HQ
Data: 50+ TB
WAN
File Shares, Desktop,
Laptop, Email
Corporate HQ
Data: >100 TB
Remote Office
Data: <1 TB
WAN
Remote Office
Data: <1 TB
Kazeon Server
(Software Only)
File Shares,
Desktop, Laptop,
EmailFile Shares,
Desktop, Laptop,
Email
Kazeon Server
(Software Only)
Kazeon Cluster
Kazeon Cluster
File Shares, Desktop,
Laptop, Email
Federated Enterprise Deployment
Typical Data Landscape
1 Corporate HQ: >100 TB
1-2 Regional HQ: 50+ TB
Remote Offices: <1 TB Each
Deployment Summary
 Kazeon IS1200 Servers in
Corporate and Regional HQ
 Kazeon Software Deployed
and manages Remote Offices
Federated View of Information
 Kazeon Information Center at Corporate HQ provides single view
of enterprise-wide data
 Unified (federated) view of Search across clusters
 Unified (federated) Reporting from one interface (aggregate
results by policy rule, etc)
Information Center
Only search results are sent
to Information Center
reducing impact on network
Kazeon Confidential - DO NOT DISTRIBUTE
Kazeon’s Portfolio for Legal Discovery
Intelligently search, classify and act on electronically stored information –
complimentary to existing data protection products
33
1. Kazeon Information Access Platform software
 Core enterprise software for file and email discovery, classification,
indexing and workflow actions
2. Kazeon Information Server
 Product for solving customer business challenges optimized to address
Information Security & Privacy challenges
3. Kazeon Information Center
 Product for creation of federation groups (groups of clusters), Unified
search and unified reports across federation groups
4. Exchange and Enterprise Vault Connectors
 Search and classify email from exchange
 Integration with Symantec Enterprise Vault
Kazeon Confidential - DO NOT DISTRIBUTE
Key Capabilities and Benefits
 Key Business Benefits
– Identify, classify, manage and preserve
information according to business value and risk
– Respond rapidly and efficiently to litigation,
investigation, or compliance requirements
– Minimize cost of electronic discovery while
mitigation organization risk
– Enable forensically-sound, defensible, auditable
and complete discovery
 Technical Benefits
– Delivers highest performance and best scalability
– Broadest support of information (structured, unstructured
data with over 400 file formats)
– Broadest reach and deployment options (enterprise wide
to remote offices and endpoints)
– Simple and easy to deploy with lowest TCO
– Unified view of entire enterprise from single console
– Only solution to deliver Proactive and Reactive Legal
Discovery
– Fully automated for continues eDiscovery
34
Awards:
Kazeon Confidential - DO NOT DISTRIBUTE
Thank You
 Recipients will receive complimentary
white paper:
Legal Discovery and Litigation
Preparedness
 Recording of presentation will be posted
on kazeon.com
 Please complete online survey
 For more information or product
demonstration:
– denise.reier@kazeon.com or
info@kazeon.com
– 1.877.KAZEON1
– www.kazeon.com
35
Kazeon Confidential - DO NOT DISTRIBUTE
Thank You

More Related Content

What's hot

2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreuschJohan Klerk
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 
teradata-demo-day.pdf
teradata-demo-day.pdfteradata-demo-day.pdf
teradata-demo-day.pdfEd Dodds
 
Seven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective ArchivingSeven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective ArchivingEMC
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpValery Boronin
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 DaysDigital Guardian
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest MindsWhitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest MindsHappiest Minds Technologies
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330Jim Kramer
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtimeBillyHosking
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemCSCJournals
 

What's hot (19)

2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
teradata-demo-day.pdf
teradata-demo-day.pdfteradata-demo-day.pdf
teradata-demo-day.pdf
 
DLP
DLPDLP
DLP
 
Seven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective ArchivingSeven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective Archiving
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest MindsWhitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 

Viewers also liked

Viewers also liked (8)

Dr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceDr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer Experience
 
Cetas Predictive Analytics Prezo
Cetas Predictive Analytics PrezoCetas Predictive Analytics Prezo
Cetas Predictive Analytics Prezo
 
Streaming Cloud Analytics: Enabling Dynamic Product Innovation From User Expe...
Streaming Cloud Analytics: Enabling Dynamic Product Innovation From User Expe...Streaming Cloud Analytics: Enabling Dynamic Product Innovation From User Expe...
Streaming Cloud Analytics: Enabling Dynamic Product Innovation From User Expe...
 
TiE Big Data panel
TiE Big Data panelTiE Big Data panel
TiE Big Data panel
 
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
 
[POMP FORUM 2015] ZAKAJ NA PODROČJU JAVNEGA IN STRATEŠKEGA KOMUNICIRANJA VRE?...
[POMP FORUM 2015] ZAKAJ NA PODROČJU JAVNEGA IN STRATEŠKEGA KOMUNICIRANJA VRE?...[POMP FORUM 2015] ZAKAJ NA PODROČJU JAVNEGA IN STRATEŠKEGA KOMUNICIRANJA VRE?...
[POMP FORUM 2015] ZAKAJ NA PODROČJU JAVNEGA IN STRATEŠKEGA KOMUNICIRANJA VRE?...
 
Cetas Presentation at GigaOM Structure 2012
Cetas Presentation at GigaOM Structure 2012Cetas Presentation at GigaOM Structure 2012
Cetas Presentation at GigaOM Structure 2012
 
Cetas Presentation on Real-time Recommendation Systems
Cetas Presentation on Real-time Recommendation SystemsCetas Presentation on Real-time Recommendation Systems
Cetas Presentation on Real-time Recommendation Systems
 

Similar to Webinar Win In Court V3

eDiscovery Perspective
eDiscovery PerspectiveeDiscovery Perspective
eDiscovery PerspectiveRuss Gould
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
 
Enterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving ChangeEnterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving ChangeIron Mountain
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaDavid Kearney
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?Mark Stokes
 
Strategic Discovery 2011 Overview ECA
Strategic Discovery 2011 Overview ECAStrategic Discovery 2011 Overview ECA
Strategic Discovery 2011 Overview ECADavid Haines
 
Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10knugent
 
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3J. David Morris
 
Capture Discovery
Capture DiscoveryCapture Discovery
Capture Discoverywlucina
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudeDiscoveryConsultant
 
10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information GovernanceEliseT2015
 
Orange Legal Technologies Considering Meet And Confer I L T A Prod...
Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...
Orange Legal Technologies Considering Meet And Confer I L T A Prod...Rob Robinson
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 

Similar to Webinar Win In Court V3 (20)

eDiscovery Perspective
eDiscovery PerspectiveeDiscovery Perspective
eDiscovery Perspective
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Enterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving ChangeEnterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving Change
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
 
Strategic Discovery 2011 Overview ECA
Strategic Discovery 2011 Overview ECAStrategic Discovery 2011 Overview ECA
Strategic Discovery 2011 Overview ECA
 
Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10
 
Data mapping
Data mappingData mapping
Data mapping
 
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 
Capture Discovery
Capture DiscoveryCapture Discovery
Capture Discovery
 
eDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law FirmeDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law Firm
 
Governance and e-discovery
Governance and e-discoveryGovernance and e-discovery
Governance and e-discovery
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
 
10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance10 Differences Between eDiscovery & Information Governance
10 Differences Between eDiscovery & Information Governance
 
EDRM - OLP
EDRM - OLPEDRM - OLP
EDRM - OLP
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
Orange Legal Technologies Considering Meet And Confer I L T A Prod...
Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...
Orange Legal Technologies Considering Meet And Confer I L T A Prod...
 
EDI 2009 Hot Topics In Corporate E-Discovery-Risk Managment and Cost Control
EDI 2009 Hot Topics In Corporate E-Discovery-Risk Managment and Cost ControlEDI 2009 Hot Topics In Corporate E-Discovery-Risk Managment and Cost Control
EDI 2009 Hot Topics In Corporate E-Discovery-Risk Managment and Cost Control
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 

More from J. David Morris

Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...J. David Morris
 
Dr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceDr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceJ. David Morris
 
Wayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarWayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarJ. David Morris
 
Laura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersLaura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersJ. David Morris
 
Cetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsCetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsJ. David Morris
 
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...J. David Morris
 
IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.J. David Morris
 
The Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryThe Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryJ. David Morris
 
Overcoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryOvercoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryJ. David Morris
 
Esoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarEsoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarJ. David Morris
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...J. David Morris
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011J. David Morris
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!J. David Morris
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border DisputesJ. David Morris
 
EMC SourceOne for SharePoint
EMC SourceOne for SharePointEMC SourceOne for SharePoint
EMC SourceOne for SharePointJ. David Morris
 
eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011J. David Morris
 

More from J. David Morris (20)

Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
 
Dr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceDr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer Experience
 
Wayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarWayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinar
 
Laura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersLaura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big Answers
 
Cetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsCetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive Analytics
 
KMWorld Presentation
KMWorld PresentationKMWorld Presentation
KMWorld Presentation
 
eDiscovery Infographic
eDiscovery InfographiceDiscovery Infographic
eDiscovery Infographic
 
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
 
IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.
 
The Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryThe Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscovery
 
Overcoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryOvercoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscovery
 
Esoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarEsoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinar
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border Disputes
 
Pardon the eDiscovery
Pardon the eDiscoveryPardon the eDiscovery
Pardon the eDiscovery
 
EMC SourceOne for SharePoint
EMC SourceOne for SharePointEMC SourceOne for SharePoint
EMC SourceOne for SharePoint
 
eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011
 
Apps Preso
Apps PresoApps Preso
Apps Preso
 

Webinar Win In Court V3

  • 1. Kazeon Confidential - DO NOT DISTRIBUTE Winning in Court: Authenticity and Admissibility of Electronic Data
  • 2. Kazeon Confidential - DO NOT DISTRIBUTE Agenda for Today  Key Challenges of eDiscovery Today  Questions for Consideration  Customer Requirements  Overview of Kazeon Solution  Q&A 2
  • 3. Kazeon Confidential - DO NOT DISTRIBUTE Only 20% of companies are prepared for eDiscovery issues 70% of Discovery costs are in attorney review Attorney Review 80% of ESI resides on laptops, file shares and email systems Digital Proliferation Average cost of single eDiscovery case is $1.5M Cost Fines or Jail Time for Corporate Officers $ Millions in fines for inadequate or incomplete data Challenges of eDiscovery ++ ++ Sources: Taneja Group, Gartner Group, ESG, Ponemon Institute Escalating Costs Increasing Scrutiny and Risk Preparation Criminal Actions Fines
  • 4. Kazeon Confidential - DO NOT DISTRIBUTE eDiscovery: Are You Prepared?  U.S. Federal Rules of Civil Procedure (FRCP) specify that electronically stored information (ESI) is discoverable – Ensures no surprises in court, everyone is prepared and each party knows what the other has – Pretrial resolution strongly encouraged; both parties can evaluate strength of other’s case  However… – 63% have been asked to perform legal discovery request (increase of 57% in 1 year) – Only 47% say their “somewhat comfortable” while 10% are not at all comfortable – Less than 20% of companies claim to be prepared for eDiscovery Issues – Average cost of eDiscovery case is $1.5M 4
  • 5. Kazeon Confidential - DO NOT DISTRIBUTE FRCP 26 - Discovery  December 2006 Update – Handles discovery of electronic documents – Rules 16, 26, 33, 34, 37 and 45  26(a) Initial Discovery – Initial discovery of ESI data sources and making available to all parties  26(f) Meet and Confer / Discovery Plan – Meet and Confer Session – understand each other’s defenses, discoverable material, develop discovery plan, seek settlement – Discovery Plan: what information each party will make available, in what form, when and any privileged statement – Rule 16 scheduling conference; parties get organized to provide for efficient process and facilitate settlement 5
  • 6. Kazeon Confidential - DO NOT DISTRIBUTE FRCP 26(f) - Timeline  Meet and Confer Session – As soon as practical after lodging suite (usually within 30-90 days) – At least 21 days before Rule 16 scheduling conference  Deliver initial disclosures to other party within 14 days of Rule 26(f) Meet and Confer session  Submit discovery plan to court within 14 days of Rule 26(f) Meet and Confer Session  Hold Rule 16 scheduling conference with 120 days of lodging suit 6
  • 7. Kazeon Confidential - DO NOT DISTRIBUTE Authenticity and Forensics Historical Approach to Forensics  Image copy of hard drives or data stored on servers  High cost and big data management problems – Average Cost $2,000 - $3,500 per drive – Duplication of data in down-stream review 7 Experts urge caution in using Forensic Imaging for Civil Cases  A “forensically sound” copy of a file preserves details of its chain of custody while accompanying metadata  A copy/move activity records information about the file, such as when it was written, ownership, times it had been “touched”, location  Validation that it is exact copy
  • 8. Kazeon Confidential - DO NOT DISTRIBUTE Advise from Experts 8 http://www.thesedonaconference.org/content/miscFiles/TSC_PRINCP_2nd_ed_607.pdf …making forensic image backups of computers is only the first step of an expensive, complex, and difficult process of data analysis that can divert litigation into side issues and satellite disputes involving the interpretation of potentially ambiguous forensic evidence …it should not be required unless exceptional circumstances warrant the extraordinary cost and burden …protective measures that take into account privacy rights, attorney-client privilege, and the need to separate out and ignore non-relevant information
  • 9. Kazeon Confidential - DO NOT DISTRIBUTE Key Questions for Consideration  Do I know where all potentially responsive data resides and can I quickly find it?  How do I know if what is collected is complete and accurate?  How can I ensure that information is not altered to avoid spoliation?  How to cull down only relevant data and minimize legal review time and cost?  How do I ensure what I submit as responsive is authentic and how do I prove it? 9
  • 10. Kazeon Confidential - DO NOT DISTRIBUTE What Customers are Asking For…  Business Requirements – Efficiency • Reduce cost with more efficient in- house data collection, analysis and preservation – Speed of Resolution • Improve analysis and speed to resolution with faster preservation and processing – Downstream Savings • Create downstream savings by sending single copy and only relevant content for legal review – Reduced Risk • Improve ability to implement and manage litigation holds on ESI at data source with complete and accurate results  Technical Requirements – Automation • Reduce manual eDiscovery process with transparency to operations – Defensible and Auditable • Defensible, repeatable and auditable process – Control • Gain control of unmanaged and potentially responsive data in a secured infrastructure – Enterprise-Wide Coverage • Enterprise-wide coverage of ESI and Data Map with single View 10
  • 11. Kazeon Confidential - DO NOT DISTRIBUTE Kazeon Solution for eDiscovery  Enables Corporate Legal and IT teams to: – Identify, classify, manage and preserve information according to business value and risk – Respond rapidly and efficiently to litigation, investigation, or compliance requirements – Minimize cost of electronic discovery while mitigation organization risk – Enable forensically-sound, defensible, auditable and complete discovery 11
  • 12. Kazeon Confidential - DO NOT DISTRIBUTE Electronic Discovery Reference Model (EDRM) 12 Kazeon provides solutions for both Proactive and Reactive eDiscovery Information Management VOLUME Source: EDRM.NET Proactive eDiscovery Identification Preservation Collection Processing Review Analysis Production Presentation RELEVANCE Reactive eDiscovery
  • 13. Kazeon Confidential - DO NOT DISTRIBUTE Kazeon Proactive eDiscovery 13 Information Management VOLUME Source: EDRM.NET Proactive eDiscovery Identification Preservation Collection Processing Review Analysis Production Presentation RELEVANCE Reactive eDiscovery Information Discovery • Visibility of all information assets • Data map of enterprise data • Custodian maps • Federated view across enterprise Indexing and Classification • Automated indexing and classification • Auto or user-defined tagging • Classification based on risk and value • Associated appropriate policies (retention, legal hold, disposition, encryption) Proactive Management • Manage and monitor information assets • Archive and migrate data into ECM, Email Archive and Records Mgmt • Modify policies as appropriate Policy Enforcement • Apply and enforce policies (retention, disposition, etc.) • Create auditable and defensible process Kazeon Proactive eDiscovery
  • 14. Kazeon Confidential - DO NOT DISTRIBUTE Kazeon Reactive eDiscovery 14 Identification Preservation Collection Processing Review Analysis VOLUME Source: EDRM.NET RELEVANCE Information Management Production Presentation Proactive eDiscovery Reactive eDiscovery Identification • Comprehensive data maps • Custodian reports • Enterprise coverage Targeted Collection • Custodian,mailbox, laptop and file shrs • Keyword, date range based collection • Collected data copied and preserved Preservation • In-place legal hold and release • Legal hold on collected data • Support for hold repositories (Enterprise Vault, NetApp SnapLock) In-House Processing • Indexing collected ESI • De-duplication, system file culling • Exception reporting Analysis • Early case assessment • Email threading • Keyword, date range, boolean search Review • Native or text review • Document coding • Export (native format, metadata, content hash) Kazeon Reactive eDiscovery Kazeon = Repeatable Business Process with Standardized Tools
  • 15. Kazeon Confidential - DO NOT DISTRIBUTE Kazeon Legal Discovery Solution  As part of Kazeon’s eDiscovery portfolio, the Legal Discovery Solution automates the discovery, classification, searching, reporting and ability to take action on potentially responsive information scattered across the network TECHNOLOGYWORKFLOW Search Classify Act  Scan Network, desktop, file shares, remote offices, endpoint laptops  Hundreds of file formats  Create data map  Single-Step Collection from all locations  Content-based collection  In-place Legal Hold or at Target  Advanced Search  Boolean, Wildcard, fuzzy, proximity, range, boosting, grouping  Combine text & metadata attributes  Analyze summary and drilldown views  Predefined and customizable reports  Report by date, content, custodian or user defined fields  Quarantine, move, copy, protect, delete, encrypt  Export to industry standard formats  Monitor & ongoing Auditing Legal Discovery Solution Discover
  • 16. Kazeon Confidential - DO NOT DISTRIBUTE  Basic metadata or full- text scans  Automated scan/rescan for incremental updates (proactive)  “One-step” process for targeted collection (reactive)  Transparent to end users 16 Discovery of ESI Sources Proactive and Reactive discovery of ESI Sources
  • 17. Kazeon Confidential - DO NOT DISTRIBUTE Discovery of ESI Sources  Supports all file systems, group shares, desktop workstations, remote laptops, email systems and document and backup archives  Minimal impact on operational performance (out-of- band)  Supports over 400 file and document formats Automatically discovers and scans network devices for further review and analysis Server or Appliance
  • 18. Kazeon Confidential - DO NOT DISTRIBUTE Laptop/Desktop Collection  Agent-less scanning for laptops and desktops  Scan profiles exclude windows binaries and applications  Checkpoint & auto-restart for efficient scanning  Supports dynamic connects and disconnects  Unique preview capability to view file text when laptop is disconnected from the network Remote Office Edition Laptops and Desktops Kazeon Cluster Eliminate manual desktop collection and over-collection
  • 19. Kazeon Confidential - DO NOT DISTRIBUTE How Collection Works… 19 1 Discover or Target specific sources 2 Initiate “Single-Step” Collection & designate Target 3 Refine Search Criteria for greater granularity Source Target Exclude Windows Files, Directories, etc. Data Range Key Words Email Sender 4 Create and View Discovery Report Name Report Select Columns for Summary and Detail Reports
  • 20. Kazeon Confidential - DO NOT DISTRIBUTE Additional Search Capabilities  Advanced search includes: – Keyword (e.g. confidential, financial projections, financial projections) – Phrase (e.g. “guaranteed revenue return”) – Boolean (e.g. word1 AND word2) OR (my phrase) – word3) – Wildcard (e.g. filename: b?g) – Fuzzy (e.g. roam~.8) – Proximity (e.g. word1, word2 ~10) – Range (e.g. mtime: [01/01/2008 TO 02/22/08] – Boosting (e.g. word1^5 word2) – Fielded (e.g. owner: john smith)  Federated search and reporting for large environments  Email and user-defined templates Advanced Search using Google-like search engine with full integration with authentication infrastructure Federated Search and Reporting
  • 21. Kazeon Confidential - DO NOT DISTRIBUTE FRCP 26(a) and 26(f)  26(a) Initial Discovery – Initial discovery of ESI data sources and making available to all parties  26(f) Meet and Confer – understand each other’s defenses, discoverable material, develop discovery plan, seek settlement – Discovery Plan: what information each party will make available, in what form, when and any privileged statement – Rule 16 scheduling conference; parties get organized to provide for efficient process and facilitate settlement 21 Collection and Culling to create relevant Data Map for quick preparation in initial Discovery and preparation for Meet and Confer Case555 - Data Map by Custodian ESI Data Map - By Type or Group
  • 22. Kazeon Confidential - DO NOT DISTRIBUTE In-House Processing Processing of ESI to cull-down to relevant results  Auto-coding to cull-down ESI – Attorney-Client privileged documents – Personal e-mails – Company Announcements – Rule based classification and re- classification – Document preview – Sophisticated tagging identifies “responsive, privileged…” docs – De-duplication  Composite object break- downs – .PST files down to individual emails and attachments – .ZIP multiple file archives – Early Case Assessment based on Collection – Any exceptions found during the culling process are reported for appropriate action
  • 23. Kazeon Confidential - DO NOT DISTRIBUTE Preservation Copy culled ESI to hold repositories (Enterprise Vault, NetApp SnapLock, secured File Shares) Removal of Duplications Preservation of Source Hierarchy Preservation of Timestamps (creation, access, modified times, etc) Something about authenticity of copied data (hash values?) After files have been culled, the next step is to take action on the results to ensure preservation of relevant data and protect against spoliation
  • 24. Kazeon Confidential - DO NOT DISTRIBUTE Legal Holds  In-place Legal Hold or at Target  Forensically-sound copies maintain chain of custody  Preserved file attributes, metadata, hierarchy, revisions and timestamps  Preservation of original file-path folder structure (source)  Integrates with Archive Repositories such as Symantec Enterprise Vault  Continuous protection by automatically scanning and preserving new files After files have been culled, the next step is to take action on the results to ensure preservation of relevant data and protect against spoliation Secondary File Share Compliant Storage Compliance DataReference Data (NetApp NearStore) Enterprise Vault, NetApp SnapLock COPY to secondary storage or to repository
  • 25. Kazeon Confidential - DO NOT DISTRIBUTE Tagging Information Customizable Tags Applied to Relevant Data; – Responsive – Privileged – Reviewed – On Legal Hold – User-defined Quickly identifying and tag privileged information for Meet and Confer / Discovery Plan – Privileged Statement After files have been culled, the next step is to take action on the results to ensure preservation of relevant data and protect against spoliation Tagged as: Responsive
  • 26. Kazeon Confidential - DO NOT DISTRIBUTE Authenticity and Auditing  Standard Audit Reports  System Auditing – All user and system activity with information about who did what when – User login – OS startup & shutdown, cluster startup and shutdown, reboots, and AD configuration changes  Data Auditing – Search Query and Report – File history by Source (history of actions on a file/email/attachment) • Who, when, what, how, from, to, input, output • Object path, Owner, Timestamps, Size Full Auditing of System and Data Activity and reporting to Rules of Evidence
  • 27. Kazeon Confidential - DO NOT DISTRIBUTE Content Analytics Reports  Analyze summary and drill-down views  Analysis by date, content, custodian or user defined fields  Export to industry standard formats (XML, CSV, PST, ZIP) 40+ standard reports or easily create custom reports
  • 28. Kazeon Confidential - DO NOT DISTRIBUTE Analytics: Matter Management  Analyze by Case, Legal Exception or Type of Document  Take Action directly from Search or Reports 40+ standard profiles or easily generated custom profiles
  • 29. Kazeon Confidential - DO NOT DISTRIBUTE 29 Review Analytics
  • 30. Kazeon Confidential - DO NOT DISTRIBUTE 30 Review and Production  Produce de-duplicated, culled and pre-reviewed data for further legal review  Export search results to native format or CSV, download to PST or ZIP  Kazeon Hold Location used by downstream legal review tool for further legal review and production (Attenex, Summation, Concordance) Select specific files or entire Result Set for Download to ZIP. Emails export to PST format Export selected search / report rows to XML or CSV format
  • 31. Kazeon Confidential - DO NOT DISTRIBUTE Complete Enterprise Coverage  Enterprise-wide deployment including data center, remote offices and mobile users  Supports all file systems, group shares, desktop workstations, remote laptops, email systems and document, email and backup archives  Minimal impact on operational performance (out-of-band and agent-less) Exchange Servers Email Archives Document Archives Encrypted Storage File Shares Backup Archives Desktops, Remote Offices and Laptops PST Remote Offices WAN Desktops, File Servers Data Centers Information Server (Software-Only or Appliance) No IT Personnel IT Personnel Mobile UsersInternet
  • 32. Kazeon Confidential - DO NOT DISTRIBUTE Federated Enterprise Deployment over WAN Regional HQ Data: 50+ TB WAN File Shares, Desktop, Laptop, Email Corporate HQ Data: >100 TB Remote Office Data: <1 TB WAN Remote Office Data: <1 TB Kazeon Server (Software Only) File Shares, Desktop, Laptop, EmailFile Shares, Desktop, Laptop, Email Kazeon Server (Software Only) Kazeon Cluster Kazeon Cluster File Shares, Desktop, Laptop, Email Federated Enterprise Deployment Typical Data Landscape 1 Corporate HQ: >100 TB 1-2 Regional HQ: 50+ TB Remote Offices: <1 TB Each Deployment Summary  Kazeon IS1200 Servers in Corporate and Regional HQ  Kazeon Software Deployed and manages Remote Offices Federated View of Information  Kazeon Information Center at Corporate HQ provides single view of enterprise-wide data  Unified (federated) view of Search across clusters  Unified (federated) Reporting from one interface (aggregate results by policy rule, etc) Information Center Only search results are sent to Information Center reducing impact on network
  • 33. Kazeon Confidential - DO NOT DISTRIBUTE Kazeon’s Portfolio for Legal Discovery Intelligently search, classify and act on electronically stored information – complimentary to existing data protection products 33 1. Kazeon Information Access Platform software  Core enterprise software for file and email discovery, classification, indexing and workflow actions 2. Kazeon Information Server  Product for solving customer business challenges optimized to address Information Security & Privacy challenges 3. Kazeon Information Center  Product for creation of federation groups (groups of clusters), Unified search and unified reports across federation groups 4. Exchange and Enterprise Vault Connectors  Search and classify email from exchange  Integration with Symantec Enterprise Vault
  • 34. Kazeon Confidential - DO NOT DISTRIBUTE Key Capabilities and Benefits  Key Business Benefits – Identify, classify, manage and preserve information according to business value and risk – Respond rapidly and efficiently to litigation, investigation, or compliance requirements – Minimize cost of electronic discovery while mitigation organization risk – Enable forensically-sound, defensible, auditable and complete discovery  Technical Benefits – Delivers highest performance and best scalability – Broadest support of information (structured, unstructured data with over 400 file formats) – Broadest reach and deployment options (enterprise wide to remote offices and endpoints) – Simple and easy to deploy with lowest TCO – Unified view of entire enterprise from single console – Only solution to deliver Proactive and Reactive Legal Discovery – Fully automated for continues eDiscovery 34 Awards:
  • 35. Kazeon Confidential - DO NOT DISTRIBUTE Thank You  Recipients will receive complimentary white paper: Legal Discovery and Litigation Preparedness  Recording of presentation will be posted on kazeon.com  Please complete online survey  For more information or product demonstration: – denise.reier@kazeon.com or info@kazeon.com – 1.877.KAZEON1 – www.kazeon.com 35
  • 36. Kazeon Confidential - DO NOT DISTRIBUTE Thank You