Showing posts with label CEIC. Show all posts
Showing posts with label CEIC. Show all posts

Heavy Hitters On Board to Share Unique E-Discovery and Legal Insights at CEIC 2015

If you come to CEIC every year to hear from the industry’s movers and shakers in the legal realm, you're in for a treat this year at CEIC in Las Vegas, May 18 – 22. We’ve secured big talent and big topics in the track called E-Discovery: Legal Issues, Technical Challenges and Solutions, including legal issues related to data breaches and information governance.

CEIC 2013: Leading Judges Speak on TAR and Digital Information in Criminal Prosecutions

Daniel Lim

Many thanks to Judges Vanessa D. Gilmore, (U.S. District Court, S.D. Tex. – Houston Division), David Waxse (U.S. District Court, Kansas), and Karla Spaulding (U.S. District Court, M.D. Fla.) for an engaging and informative panel at the CEIC® 2013 conference in Orlando.

TAR: Holy Grail or Helpful Tool?
Judge Waxse helped to start us off with a discussion of whether experts would be required to testify for the use of new technologies in discovery, such as technology assisted review (TAR).  While Judge Peck has indicated his view that such testimony would NOT be needed because Federal Rule of Evidence applies to trial, rather than discovery, Judge Waxse takes an opposing view.  

Announcing our CEIC Caption Contest Winner

Guidance Software

Congratulations to Paul Webel from Vestige. His caption won our caption contest by a landslide! Thank you to all who participated. Your captions generated quite a few chuckles around Guidance Software.

Again, congratulations to Paul!

The Road to CEIC 2013: Orlando, We are Here to Stay!

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

After our fabulous Tuesday, we all had an extra half hour of sleep this morning, the final day of CEIC. Breakfast was sponsored by H11 and Cellebrite; and at 7:40 AM, the Early Birds were already enjoying the sun and great weather outside.

The Road to CEIC 2013: Tuesdays at CEIC

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

Tuesday @CEIC_Conf is a day we all look forward to enjoying. By Tuesday morning, essentially all of the lab and session rooms are running smoothly; everyone is familiar with the hotel layout and knows where they are going; you have connected with most of your friends, former colleagues, co-workers and partners you wanted to see at the conference; the excellent keynotes are in the annals of CEIC history, etc. In other words, all of the anxiety and issues around producing or attending such a large event have largely been experienced and worked through, and you can enjoy a full day of learning and networking.

The Road to CEIC 2013: Through the Years

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

The first full day @CEIC_Conf 2013 began with breakfast at 7:00 AM, accessed by a trip down memory lane on the Blue Carpet with Guidance Software™ | EnCase® “Through the Years.” It reminded me of some of the historical displays I enjoy reading at airports while waiting for my flight, such as in the Hong Kong terminals, and it brought me a lot of nostalgia. It has been an honor to be part of this Winning Team for the past 12 years.

The Road to CEIC 2013: Good Guys Need to Work Together

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

Day One of @CEIC_Conf started early. We had staff breakfast at 7:30 AM. Over breakfast, I was privileged to have a preview of David Shaver’s lab Following an Intrusion Through a Microsoft Operating System (Automated and Manual) – May 20th, 1:30 PM – 3:00 PM. Dave is a Special Agent for the SIGTARP and we served together in the US Army Criminal Investigation Command (CID). He is one of the foremost experts in digital investigations, and he will take you through an incident response with EnCase® and freeware tools.

CEIC Caption Contest

Guidance Software

Submit your caption for this cartoon! The caption with the most votes will win an Apple iPad! Winner will be announced June 10, 2013. Be original and have fun! Enter on our Facebook page.

Attendance at CEIC is not required to participate so join in!

The Road to CEIC 2013: The Night Before CEIC – There’s an App for That!

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

The Rosen Shingle Creek hotel is an amazing facility. It is largest venue to host @CEIC_Conf to date, with conference space 210% larger than 2012. They literally rolled out the red carpet for Guidance Software and the attendees. Yesterday, Sean Doherty of Law Technology News wrote a great pre-conference article CEIC: The Destination for Digital Investigation. He said in summary, “At CEIC, I'm looking forward to picking up more skills in EnCase® Forensic 7, and learning about the new EnCase® Enterprise product — as well as enjoying a general update in the law and technology for e-discovery.”

The Road to CEIC 2013: EnCase in Action!

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

The final agenda for @CEIC_Conf #CEIC was just released. Some breaking news: Guidance Software will unveil and describe in-depth EnCase® Analytics, our new security intelligence product employing big data analytics. EnCase Analytics empowers customers to find and expose cyber-threats hiding behind complex relationships in the wealth of data that exists within the sum of all endpoints of an enterprise. Presentations and demonstrations about EnCase Analytics will be available throughout the conference. I have been looking forward to this big announcement for months, and I will be creating the EnCase OnDemand training for EnCase Analytics this summer.

The Road to CEIC 2013: BYOD to CEIC!

Jessica Bair

The “Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

The Smartphone, Social Media and Cloud Investigations track provides solutions to manage the issues that come with a more mobile, connected and dispersed population and workforce. Bring Your Own Device (BYOD) offers employees and organizations countless business benefits, from increased efficiency to controlling costs on provisioning a mobile workforce. This comes with the inevitable question: How do we support all these devices in a secure environment, while allowing the workforce to be productive? This will be the focus of The Technical Challenges of Bring Your Own Device (BYOD) discussion with Rodney Smith, Guidance Software director of IT security, Michael Sparks of Intel, and Kia Hakimi of Best Buy. BYOD policy considerations, management of personal information on the devices, device discovery, over-the-air-configuration, self-service portals, cloud based repositories for BYOD data (e.g. and MobileIron), and managing data usage; these are all critically important to every organization, as we are all mobile. If BYOD is your pain point at work, you should also attend E-Discovery Case Law: Legal ramifications of BYOD.

The Road to CEIC 2013: Labs Designed for the E-Discovery Practitioner

Jessica Bair

"The Road to CEIC 2013” is a series of blog posts on all things CEIC, before, during, and after, from an insider’s point of view.

Next week, David Neal will be teaching the EnCase® eDiscovery course to another packed classroom of eDiscovery practitioners. David is the course developer and lead instructor for EnCase eDiscovery, and for the first time at CEIC, he will present an EnCase Certified eDiscovery Practitioner (EnCEP®) review session.

May 19, 2013: First-ever EnCEP Review Session at CEIC

If you have attended David's EnCase eDiscovery course before CEIC, in person or On Demand, this is a perfect opportunity to brush up on your skills. You can take the EnCEP test for free with your CEIC registration. You must meet the training and experience requirements and register by April 26th. When I created the EnCEP program in 2009, leading a working group of e-discovery professionals to produce the first certification of its kind, I looked forward to the day that the certification review and testing would become part of the CEIC experience. May 19th is that day!

CEIC 2012: The Confluence of Law and Information Security

John M. Blumenschein

While most of the panels during the 2012 CEIC e-discovery talking track were attended primarily by attorneys, the final day was kicked off with a lively discussion that included a very engaged audience composed primarily of IT security and incident response (IR) professionals. I had the good fortune to moderate this fascinating discussion entitled “Legal Issues Stemming from Data/Security Breaches.” The panel consisted of two highly knowledgeable attorneys, Brent Kidwell, Partner and Chief Knowledge Counsel at Jenner & Block LLP, and Tom Lidbury, Partner at Drinker Biddle & Reath LLP, as well as the Director of Investigative/Legal Discovery at one of the most respected healthcare facilities in the world, Frank Krahn of the Mayo Clinic.

The discussion started off with Brent giving an overview of some high-profile breaches, as well as a statistical breakdown of who are the most common perpetrators of these breaches and how they are conducted. He also discussed how organizations face threats from both the inside (e.g., disgruntled employees, departing employees, opportunistic employees, etc.) as well as the outside (e.g., competitors, nation-state actors, criminals organizations), and how this dichotomy often dictates the reason for, and manner in which, breaches are conducted.

Next, they discussed entities that are particularly at risk, and two that were on the list, healthcare institutions (as holders of patient data) and law firms (as holders of client data), allowed for the panelists to talk about some of the steps their organizations have taken to combat these threats. From there, they discussed some of the federal and state data breach statutes and regulations, and Frank was able to use this topic to discuss his own experience at the Mayo Clinic in dealing with one of the most widely-recognized statutes to address the issue of protecting personal information—the Health Insurance Portability and Accountability Act (HIPAA).

One of the persistent themes of the discussion (and the one that seemed to prompt the highest number of heads nodding in approval whenever it was raised) was that of having legal and IT security/IR actively working together in order to address the issue of data breaches. Never was it more apparent than when the panel came to the topic of managing legal risk, i.e., what an organization should do to both prepare and respond to a data breach. Some examples of preparing included developing an IR plan and team (which legal needs to be a part of), conducting audits/reviews of security, tracking/mapping data, and having a legal compliance program. Some examples of responding included the proper handling and preserving evidence of a data breach, involving an organization’s legal department or outside counsel and possibly notifying law enforcement. This lead to the concluding topic on how and when to involve law enforcement, where Frank talked about his own experience at Mayo working with agencies such as the FBI and Secret Service, and what evidence needs to be presented/documented in order to ensure a successful prosecution.

The panel today prompted many interesting questions from audience members, and topics such as “bring your own device” and “the cloud” were also discussed. With their unique hybrid legal/technical perspectives and firsthand experiences grappling with the issue of data breaches, Brent, Frank and Tom provided the audience with comprehensive, nuanced and practical advice on how to deal with these ever-growing threats

The Road to CEIC 2012 – Day Three of CEIC v12: A Full Day of Learning

Jessica Bair

The “Road to CEIC 2012” is a series of blog posts on all things CEIC (@CEIC_Conf), before, during and after, from an insider’s point of view.

Each morning at CEIC, thousands of cups of coffee are consumed by attendees, presenters and staff…the oil lubricating the engine of the premier event for the exchange of best practices in Digital Investigations. The Cyber Response lab track started Wednesday, the final full day of CEIC v12, with Collection and Analysis Strategies in a Multi-TB World, by Mike Webber, owner of BitSec Global Forensics. Mike is clearly a professional instructor, as he led the attendees in a facilitated group discussion on multi-terabyte collection strategies, with commercial tools such as EnCase Enterprise, EnCase eDiscovery and EnCase Portable, as well as freeware and open source tools. He then shifted to a hands-on lab exercise, during which Mike shared techniques for triaging large data sets; helping the attendees with skills to triage large data sets quickly and efficiently, and provide reliable answers sooner to their clients or legal team.

We had a refreshment break in the Exhibit Hall, and a great opportunity to explore the many hardware products Tableau offers for forensic imaging. Attendees were taking advantage of connecting with the Technical Services team, lead by Griffith Williams, director of technical services. You have spoken with them on the phone, communicate by email, remote support session and message board, and now are able to meet them in person!

The Cyber Response lab track continued with EnCase Cybersecurity Command Center: SQL Databases Exposed! by Aaron Bennett, Guidance Software field engineer, and Stephen Pascual, manager of Enterprise Application development. Aaron and Stephen delved into the Microsoft SQL Database setup and diagnosis in the ECC Ecosystem (EnCase eDiscovery and EnCase Cybersecurity). They shared their custom scripts and tools for managing, connecting and backing up the SQL databases. Then they took the attendees through hands-on exercises, with a practical setup guide, and tips & tricks for solving common problems.

After lunch, the Cyber Response lab filled to capacity again with Memory Analysis & Malware Triage by David Nardoni, director at PWC, and Jef Dye, manager at PWC. We brought in extra chairs to accommodate the stand-by attendees. David and Jeff provided an overview of commercial and free tools for live memory collection and analysis; and covered basic malware triage, skills and pitfalls. After which, we checked out automated cyber response in the Exhibit Hall.

Wrapping up Cyber Response for the third day was Planning to Manage Incidents: Beyond the Response by David Brown of Accuvant. How organizations respond to the widening spectrum of security incidents is an important component of risk management; and David facilitated a discussion on best practices for preventing damage to the organization’s operations and reputation. David provided his experience in: 1) Building the plan, 2) Rolling out and executing the plan, and 3) Post incident procedures, such as closure communications and wrap up, control review, and process lessons learned.

Don’t forget to register for CEIC 2013 before you leave on Thursday, and lock in the $695 discount rate on the conference fees. You have the justification from your experiences this week, to help your management team understand the benefit on investing in your training and professional development.

vWith the sessions completed around 5pm, there was time to go experience the social side of Las Vegas with friends and colleagues. I enjoyed our team dinner with the Training Department staff who provided the backbone support for the CEIC v12 labs and certification testing. Well done Team Training!

Jessica Bair
Senior Director, Curriculum Development

CEIC “Judicial Perspectives” Panel Again Attracts Overflow Crowd

Patrick Burke
Ken Withers, Judge Herbert Dixon, Judge John Facciola and Judge Andrew Peck

The “Judicial Perspectives” panel is consistently the best attended event on CEIC’s E-Discovery track, and yesterday the judges once again filled the room to overflowing. This year’s panel featured US Magistrate Judge John M. Facciola in the District of Columbia, Judge Herbert B. Dixon, Jr. of the D.C. Superior Court, and US Magistrate Judge Andrew J. Peck of the Southern District of New York and was moderated by Kenneth J. Withers, Director of Judicial Education for The Sedona Conference®.

The discussion began about the “bring your own devise” (BYOD) trend, with Judge Facciola holding up his iPhone, which he purchased but for which the federal judiciary pays the monthly fees and on which he conducts official business with data stored in the cloud. “Who has possession, custody or control of my data?” he asked. It’s not held on any federally-controlled server, and not really held by the Judge himself.

The topic of possession, custody and control continued with a discussion of the e-discovery challenges associated with data stored in the cloud. Judge Peck told the story of a Chief Information Security Officer who had authority over e-discovery within his multi-billion dollar company who, when told that the company could enjoy significant savings by moving to “the cloud”, questioned whether the cloud provider could accommodate their needs to adapt cloud storage with the organization’s e-discovery preservation requirements. The cloud provider said it could but at such an increased cost that the company would enjoy no savings at all if it migrated to the cloud.

Discussion turned to e-discovery in social media, in which Judge Dixon noted that, in his experience, admissibility of social media was contested much more fiercely in civil cases than in criminal. The judges discussed various ways courts have attempted to handle the discovery of postings on Facebook and Myspace, including judges who undertook to examine the postings themselves to preserve the privacy of litigants postings. Judge Facciola, doubting whether judicial in camera review was a wise use of judicial resources, quoted a Pennsylvania judge who, after reviewing hundreds of Facebook postings, wrote “Why did I do that?” Judge Peck advised the audience that what litigants should avoid is a “fishing expedition” into a party’s Facebook postings, and reminded them that social media postings – which have been posted for viewing by some audience, if not the general public – do not carry privacy protection under US law. Rather, the consideration is a question of relevance under Federal Rule of Civil Procedure 26(b).

These are just a few of the topics raised by Ken Withers on which the Judge’s gave their views of the law and their thoughts on where the law may go in the future. The panel of judges was “hot” and the audience was treated not only to a high-level discussion but also the evident humanity and character of each of the three judges, who were kind enough to join other lawyers that evening for CEIC’s “E-Discovery Dinner” which has become a tradition of good cheer and conversation.

CEIC Panel on International E-Discovery Features Globally-Ranked Experts

Patrick Burke
Jim Daley, Chris Dale, Quentin Archer, Dominic Jaar and Patrick Burke.

CEIC attracts attendees from organizations operating around the world, so there was strong interest in the panel on “International E-Discovery: Data Protection, Privacy and Cross-Border Issues.” The panel featured Quentin Archer from Hogan Lovells International LLC’s London office, M. James Daley of Daley & Fey (US), Dominic Jaar of KPMG-Canada, Chris Dale of the eDisclosure Information Project (UK) and moderated by Patrick Burke of Guidance Software. Both Quentin Archer and Jim Daley are immediate past Chairs of the Sedona Conference Working Group 6 on International Electronic Information Management, Discovery and Disclosure.

The discussion began with an explanation of the various approaches to discovery in jurisdictions around the world, and how those different approaches to discovery influence attitudes and resentments among lawyers and courts in jurisdictions with diametrically different approaches. Chris Dale likened these differences in perception to the different views of D-Day, one the Allied view of storming a fortified beach, the other the Axis view of being invaded from the sea. Dominic Jaar asked how US parties would feel if they received what they considered an overbroad and invasive document request – from a court in China?

The Road to CEIC 2012 – A Beautiful Day at the CEIC v12 Rotundas

Jessica Bair The “Road to CEIC 2012” is a series of blog posts on all things CEIC (@CEIC_Conf), before, during and after, from an insider’s point of view.

In the center of the bustling activity on Monday, attendees found a new addition to CEIC, the Rotundas in the Red Rock Veranda room, with two interactive exhibits: E-Discovery Done Right and EnCase App Central.

The E-Discovery Done Right Rotunda is the official CEIC lounge for all things e-discovery. It is the place attendees can visit throughout CEIC v12 to speak with experts about how to streamline your e-discovery processes. Join others who took the opportunity to meet Case Central, the newest addition to the Guidance Software family. With the acquisition of CaseCentral, Guidance Software delivers a complete e-discovery solution, addressing the needs of corporations and government agencies. The combined product portfolio provides increased efficiency and automation, as well as lower risk for e-discovery activities. The integrated solution spans from legal hold, identification, collection, preservation, processing, first pass review and early case assessment through review and production capabilities.

The combined offering deploys software intelligently, with EnCase eDiscovery delivering the legal hold, identification, collection, preservation, processing, ECA, and first pass review functions on-premise, at your site — close to the sources of data and the data custodians — and CaseCentral delivering additional capabilities for early case assessment, review and production functions as SaaS in the Cloud, so that geographically dispersed inside and outside counsel can efficiently review and produce without needing any special equipment or software other than a web browser and internet connectivity. The scheduled presentations continue through Wednesday, May 23, on E-Discovery Done Right, Early Case Assessment and Legal Hold; along with a Happy Hour each evening. See schedule below.

At the EnCase App Central Rotunda, attendees are learning about the new online exchange for EnScripts®. Several years ago, we created the ability to protect the source code of your EnScripts through EnPack licensing. This made it possible for third-parties to develop and sell EnScripts for EnCase Forensic and the EnCase Enterprise platform on their websites. There is also an EnScript Resource Center on the Guidance Software Support Portal (registration required) with over 230 free EnScripts posted by Guidance Software staff and the EnCase user community. With the EnCase App Central marketplace, there will be a place for you to go to find EnScripts for all of your digital investigation needs; and if you are a developer, to market your intellectual property and be compensated for your work.

The EnCase App Central Rotunda is staffed by veteran instructors James Habben and Simon Key. These are the brilliant gentlemen who develop and teach the popular expert courses EnScript® Programming and EnCase Macintosh® / Linux Examinations, respectively. You can also catch James and Simon teaching labs ranging from EnScript for Non-programmers, to File Block Hash Map Analysis, to Kindle Fire Investigations and Decoding Prefetch Files.

In 2005, I led the team that created EnCase eDiscovery v1, and visited CaseCentral for the initial conversations on our partnership. It is gratifying to see that partnership blossom into a family relationship…and create such a comprehensive solution! Prior, I was in Research and Development, where we envisioned the day where developers and customers could connect on the web to buy and sell EnScripts. It is a beautiful day indeed…come check out the Rotundas for yourself.

Jessica Bair
Senior Director, Curriculum Development

Rotunda and Expo Hall Presentations:

E-Discovery Done Right, Legal Holds, EnCase App Central Overview, E-Discovery Review & Production, Forensic Solutions, Partner Showcases, EnCase Cybersecurity and more.

EnCase App Central and E-Discovery Done Right Rotunda Hours:

Monday: 9:00a to 6:00p
Tuesday: 7:00a to 5:30p
Wednesday: 7:00a to 6:00p
Thursday: 7:30a to Noon

Expo Hall Hours

Tuesday: 10:30a to 6:30p
Wednesday: 9:30a to 3:30p

Presentation Schedule (10 Min. Presentations)

EnCase App Central Rotunda

11:30a - App Central Overview
2:00p - App Central Overview

10:40a - App Central Overview
1:30p - Partner Showcase
3:40p - Partner Showcase

12:30p - Partner Showcase
1:30p- Partner Showcase
3:15p - App Central Overview

E-Discovery Done Right Rotunda

11:00a - E-Discovery Done Right
1:00p - Legal Review & Production
1:30p - Legal Hold


12:30p - E-Discovery Done Right
1:00p - Early Case Assessment
2:00p - Legal Hold


9:40a - E-Discovery Done Right
1:30p - E-Discovery Done Right
3:45p - Legal Review & Production
4:15p - Legal Hold
5:10p - Early Case Assessment

The Road to CEIC 2012 – Cybersecurity and E-Discovery Databases Exposed!

Jessica Bair

The “Road to CEIC 2012” is a series of blog posts on all things CEIC, before, during and after, from an insider’s point of view.

The Cyber Response lab is really coming together. Guidance Software Training Manager, Jamey Tubbs, and Senior Manager of Special Projects, Joe Murin, have been working diligently to ensure the base build for the Cyber Response and E-Discovery lab machines have all of the software and tools needed by the instructors. They have created an amazing infrastructure you will see when you sit down at the machines…simply brilliant!

Joe and Aaron Bennett, Guidance Software field engineer, are currently configuring the SQL databases for the E-Discovery and Cyber Response labs. Aaron will be leading the lab EnCase Cybersecurity Command Center (ECC): SQL Databases Exposed! with Stephen Pascual, manager of Enterprise Application development. Aaron and Stephen will be going through the setup and diagnosis of Microsoft SQL in the ECC Ecosystem. Those who use ECC, whether for cybersecurity or e-discovery, know that the Global and Case SQL databases are a critical part of the solution. In addition to providing a practical setup guide, they will also be covering tips and tricks for solving common problems with your SQL databases. If you are an EnCase Cybersecurity or an EnCase eDiscovery user, this lab needs to be on your schedule!

I just booked by my flight to the Las Vegas Airport. Thank goodness for WiFi enabled aircraft so I can stay connected on the way to CEIC (@CEIC_Conf)!

Jessica Bair
Senior Director, Curriculum Development

CEIC 2012 – Cyber Response Lab

10:30 AM - 12:00 PM
EnCase Cybersecurity Command Center: SQL Databases Exposed!
Aaron Bennett, Guidance Software, Inc, Stephen Pascual, Guidance Software, Inc
Skill Level: Advanced

EnCase eDiscovery 4.2 Makes Electronic Discovery Easier for Enterprises

Guidance Software EnCase® eDiscovery delivers all of the speed, scalability and ease of use that organizations expect from an e-discovery solution
EnCase® eDiscovery version 4.2 software includes more than a dozen enhancements that give corporate e-discovery teams more control and automation over their enterprise deployments combined with a new user interface to make e-discovery collection and processing even easier.

The software made its debut at the Computer Enterprise Investigation Conference (CEIC) in Orlando, Florida last month.

New “check-the-box” wizard provides improved ease of use

In version 4.2, the company has a new “check-the-box” collection and processing “wizard” to help quickly specify what electronically stored information (ESI) should be collected and/or processed. These capabilities help e-discovery teams to set up repeatable processes that are the linchpin to defensible e-discovery efforts.

New easy-to-use collection and processing interface

Improved automation and workflow
New automation features include load balancing, and the ability to build workflows, which enables better prioritization and fast processing across global enterprise infrastructures. The new features are added to a platform that is well known in the industry as the gold-standard for collection and processing strength, and an architecture that offers unlimited scalability and usage, which means enterprises can take on large cases without having to upgrade the product or purchase additional licenses.

Support for Microsoft Office 365
Adding to its long time Microsoft Office Exchange and SharePoint collection capabilities, EnCase® eDiscovery now supports Microsoft Office 365. Support enables the collection of electronically stored information (ESI) from Microsoft Office Exchange and SharePoint in the cloud. This new feature is important for those organizations that are transitioning to the cloud.

Guidance Software was also recently named a Leader in the first Gartner Magic Quadrant for E-Discovery which assesses 24 vendors on their ability to execute and completeness of vision in the e-discovery market. To download the full report click here: Gartner Magic Quadrant for E-Discovery.

“Enterprise e-discovery solutions increasingly must handle multiple digital investigation scenarios – not just legal cases – as well as supporting organizational goals without disrupting business, delivering collection and preservation strength that stands up in court, and providing scalable data capacity,” said Katey Wood, analyst for Enterprise Strategy Group.

EnCase® eDiscovery is a comprehensive enterprise e-discovery solution that includes legal hold, pre-collection analytics, collection, preservation, processing, analysis and first pass review. It is based on the company’s judicially accepted forensic technology.

Take control of e-discovery with a single, unified solution
EnCase® eDiscovery enables customers to take control of their e-discovery in a single unified solution that manages everything from legal hold through first-pass review, preserves metadata, only collects relevant files, and is scalable across large global networks with unique pre-collection analytics as well as analysis and first-pass review at any point in the process – all backed by expert services from Guidance Software that provide industry standard best practices, training, and certifications (EnCE® and EnCEP®).

EnCase® eDiscovery version 4.2 is available now.

Russ Gould is director of product marketing at Guidance Software.

EnCase®, EnCE®, EnCEP®, EnScript®, FastBloc®, Guidance Software™ and Tableau™ are registered trademarks or trademarks owned by Guidance Software in the United States and other jurisdictions and may not be used without prior written permission. All other marks and brands may be claimed as the property of their respective owners.

Forward Looking Statements

This news release contains forward-looking statements within the meaning of the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Investors are cautioned that forward-looking statements in this release involve risks and uncertainties that could cause actual results to differ materially from current expectations. There can be no assurance that demand for the Guidance Software's products will continue at current or greater levels, or that the Company will continue to grow revenues, or be profitable. There are also risks that the Guidance Software's pursuit of providing network security and eDiscovery technology might not be successful, or that if successful, it will not materially enhance the Guidance Software's financial performance; that the Company could fail to retain key employees; that changes in customer requirements and other general economic and political uncertainties could impact the Guidance Software's relationship with its customers; and that delays in product development, competitive pressures or technical difficulties could impact timely delivery of next-generation products; and other risks and uncertainties that are described from time to time in Guidance Software's periodic reports and registration statements filed with the Securities and Exchange Commission. The Company specifically disclaims any responsibility for updating these forward-looking statements.