2 © 2010, teris, agenda introductions teris overview esi service listing edrm unparalled esi...
TRANSCRIPT
2© 2010, Teris, www.Teris.com
Agenda
Introductions
TERIS Overview
ESI Service Listing
EDRM
Unparalled ESI Capabilities
Technology Advantage=Substantial ROI
Reporting
Security
Confidentiality
Questions/Answers
Next Steps
3© 2010, Teris, www.Teris.com
Attendees
4© 2010, Teris, www.Teris.com
TERIS Overview
TERIS was established in Seattle 1996. Operations have since expanded and include additional offices in San Francisco, Silicon Valley, San Diego, Phoenix, Austin, Dallas, and Chicago.
All locations provide:• Consulting and Project Management• Computer/Data Forensic Acquisition• Electronic Discovery• Document Imaging• Digital Forensics• Repository/Hosting• Traditional Reprographics
5© 2010 Teris, www.Teris.com
ESI Service Listing
Case ManagementData Collection/Strategy Consulting Dedicated ESI Project Manager
Data CollectionHard Drive ImagingOn-Site Data Filtering TX Licensed Private Investigator
LIC#A15445
Data RecoveryExpert Forensic AnalysisManaged Review
PST/NSF Pre-ProcessingDe-Duplication ProcessingProcess all email container-POP,
IMAP, MBOXText File ExtractionFiltered/De-Duped PST/NSF FileRegeneration
Native File Processing Metadata Extraction Text File ExtractionTIFF Conversion
Online Repository Services
Multi-Site/User CollaborationBrowser Based - Remote AccessCustom Database DevelopmentClearwell, Relativity, iConectnXT,
FYI
Production ServicesTIFF GenerationElectronic
Numbering/DesignationNative File Production
© 2010, Teris, www.
Electronic Discovery Reference Model
6
7© 2010, Teris, www.Teris.com
Unparalleled ESI Capabilities
Preprocessing capabilities exceed 63 million pages per week- more than one terabyte every 2 days
Early case assessment powererd by fast, accurate, manageable, and secure technology from Clearwell Systems eDiscovery Platform
Evidence extraction from a variety of electronic data sources including emails, reports, and spreadsheets
Data conversion to images and/or text in any desired format
File conversion and database creation services
TIFF, native file, and hybrid delivery
Index documents and files for increased visibility and organization
Search on words, phrases, concepts, and document attributes to quickly find relevant information
8© 2010, Teris, www.Teris.com
Technology Advantage = Substantial ROI
TERIS eDiscovery best practices and technologies level the playing field between these two mediums, allowing you to assess cases quickly and accurately, saving time and money.
Realize Substantial ROI
TERIS provides intelligent analysis, unique processing, accurate searching, innovative culling tools and productive review systems that:
· Accelerate Early case assessment from days to hours
· Lower processing costs and time by up to 80%
· Reduce review workload by up to 90 percent
· Complete investigations 10 times faster
© 20
(Sentence about customizations of reports based on clients request)
Data AcquisitionPre-Process IndexPre-Process File ListDe-DuplicationData Size & Costs TrackingSearch Term InclusiveSearch Term ExclusiveExceptionsDelivery TrackingProject Tracking (Status)Clearwell Reports
Reporting
9
10© 2010, Teris, www.Teris.com
TERIS’ secure facilities are protected by 7 X 24 digital color camera surveillance, and physical security systems on all doors surrounding sensitive data. Glass break, door tampering, and motion sensors are monitored by a professional alarm monitoring service. Logging and auditing of card swipe systems occurs regularly.
Critical areas are separately secured. Facilities have keycard access on exterior doors and elevators as well as floor level access restrictions, CCTV surveillance and security guard patrols.
TERIS utilizes Chain of Custody (CoC) and storing of data in a secure vault.
All entrances/exits to the facility are covered by a high-definition color security camera system with a 45-day video loop
All entrances have a numeric keypad with an 8-digit combination and/or a keycard
The datacenter that houses our Client data, is behind five levels of access security, is only assessable by three individuals, is closely monitored by both video surveillance, and the data itself is protected by several layers of software/hardware security
Only authorized employees have access to the datacenter Anyone who is not an employee or an authorized vendor must be
escorted by a qualified member of the TERIS staff and have a business reason to enter into any of our facilities
Security-Physical
11© 2010, Teris, www.Teris.com
Security-Network
Network - System Hardening and Intrusion Detection
· TERIS utilizes polices and active directory policies to deploy and enforce system hardening of Client-facing and critical business systems.
· TERIS employs industry accepted best practices with respect to system hardening on all systems hosting Client information including:
· Removing all unnecessary system functionality including scripts, drivers, features, subsystems, and file systems
· Disabling all unnecessary and insecure services and protocols
· Configuring system security parameters to prevent misuse
· Changing vendor supplied defaults before the system is live on the network
12© 2010, Teris, www.Teris.com
Confidentiality
· TERIS protects data from unauthorized (accidental or intentional) modification or destruction
· TERIS adheres to the strictest standard of confidentiality and will not disclose any information learned, seen, heard or said, either directly or indirectly
· Safe Harbor-Data Security and PrivacyWe have appropriate security measures in place in our physical facilities to protect against loss, misuse or alteration of information that we have collected. Effective October 1, 2008, our Seattle, Silicon Valley, and Austin locations were all Safe Harbor certified.
© 2010, Teris, www.Teris.com
Questions/Answers
Next Steps
Thank you
Questions/Answers