SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Reduced Cost and Time-of-Retrieval by developing intelligence
over an existing Electronic Data Discovery tool for
a Litigation Support Services Provider
T h e c l i e n t s e r v e s l e a d i n g
corporations, law firms and
government agencies through their
broad range of litigation and business
consulting services. Dealing with
large amount of data, the client
wanted a seamless electronic data
discovery tool that would provide
them digital archival and retrieval of
data so as to ensure security and
reliability for future reference. The
c l i e n t a p p r o a c h e d S i g m a
Infosolutions to leverage their
expertise on Electronic Data
Discovery and develop a robust tool
that could automate large scale data
search and retrieval. This tool will
integrate with the suite of e-
discovery solutions already offered
by the client.
Headquartered in Seattle, the client is a premier provider of broad range of
litigation & business consulting services to corporations, law firms and
government agencies across NorthAmerica.
The ClientExecutive Summary
The client initially used DT Search for retrieving sensitive data from its
customers’ network. However, every time the discovery needed to be
performed, a thin client had to be installed on its customers' network. This
limited flexibility resulted in the client having to manually share and unshare
the drives in the network and also manually copy the information to a specific
location. The client wanted a domain expert to design, build,and test an
electronic data discovery tool that would provide centralized access to all
necessary data needed for zero defect archival & retrieval. They also wanted
the tool to automatically save a copy of the extracted data onto a preferred
location and archive to a common repository when the client plugged back
into its own network. This solution would also improve the overall
performance of the EDD process.
Business Case
sales@sigmainfo.net
Challenges
The client was often working with sensitive data and could not afford to
compromise on the integrity of the data. This was a significant challenge for
the successful operation of this tool. Also, the tool needed to remove traces
of all activity to ensure security compliance and prevent network
vulnerability. Since the client would plug itself into their customers' network
during this discovery, the tool had to have the capability to crawl across the
network, share the drives, extract data and then unshare drives to ensure
minimal data pilferage risk.
While testing, it was a challenge to simulate up to 1700 boxes and such large
data silos. Preventing network hacks and vulnerability on the network during
extraction was a significant challenge.
Solution
Sigma Infosolution’s team worked closely with the client's team to design and
develop MARCO - comprising of 3 modules namely eDiscovery, Indexing, and
Search Engine. MARCO was implemented as an intelligent solution layer onto
30% time savings
during discovery
and retrieval
of e-documents
“
Technology
 J2EE
 .NET components
 SQL Server 2000 database used for
storage. Compatible with Oracle &
MySQL
 Hibernate used as ORM tool for
efficient connection pooling
 Supports exchange server indexing
(compatible with Exchange Server
2000 & above
Business Benefits
Key benefits included:
 Cost effective tool to review a
large set of data in their native
format
 Faster indexing at a speed of 4-5
GB of data per hour
 Supports Microsoft Exchange
indexing along with files systems
and various document formats
 Supports all the searching features
extended by DT Search
 License Free Software with
complete ownership
 Capability to support context based
search for analysis
the existing DTsearch framework to develop a centralized web-based
application that would offer the combined powerful search capabilities
across an enterprise network. MARCO supported all the basic search types
like boolean, phrase or proximity based, along with fuzzy searching,
relevancy ranking and natural language based searching. MARCO was built to
be installed on an individual laptop of the client's executive and when
connected to an enterprise's network would act as a portable server to
completely automate the document retrieval process. It would:
 Automatically crawl into the network to detect the numerous Microsoft
Windows OS based heterogeneous boxes like e-mail servers, network
servers, backup tapes, desktops, laptops, PDAs, etc.
 Automatically share main drives of these boxes on the network to
perform indexing
 Index all the documents stored in various electronic file formats
 Perform search on the indexed set of documents to acquire the data as
per client's requisites
 Automatically save a local repository of the entire set of documents
searched on to the client's portable server
 Automatically un-share all the various systems attached
 Perform filtering by removing duplicate and other non-responsive files
to retrieve the exact set of e-documents
The entire solution was developed, tested and deployed with zero variance
on schedule and budget.
www.sigmainfo.net
About Sigma Infosolutions
 Sigma Group, an Indian conglomerate has more than 4 decades of experience in Mining, Chemicals Manufacturing & Export,
Handicrafts Manufacturing & Exports, and Software Development
 Sigma Infosolutions is a TUV certified ISO 9001:2008 & ISO 27001:2005 company
 Headquartered in US with presence in India
 Some of our esteemed customers include Airtel, Zyme Solutions, Yodlee, Celerity Consulting, Resolution Economics, Birla
Global Asset Finance, Fosroc Chemicals, Surgery Planet etc.
 Sigma Infosolutions’ services comprises of application development, application management, IT Consulting, Offshore testing,
and Website and Portal Development
Sigma Infosolutions, Sigma Towers, #66/A, 13th Cross
6th Main, JP Nagar, 3rd Phase, Bangalore- 560078
Telephone: +91-80-40865100
Sigma Infosolutions, 2082 Michelson Dr.
Suite 100, Irvine, CA 92612
Telephone: +1-714-717-1826
Fax: +1-866-405-6750, Toll Free: 1-888-861-7360
Website: www.sigmainfo.net
E-mail: sales@sigmainfo.net
Toll Free: 1-888-861-7360

Weitere ähnliche Inhalte

Was ist angesagt?

(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon (SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon Priyanka Aash
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
How South Dakota's BIT defends against cyber threats
How South Dakota's BIT defends against cyber threatsHow South Dakota's BIT defends against cyber threats
How South Dakota's BIT defends against cyber threatsElasticsearch
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdfAkhil Kumar
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm IJECEIAES
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
 
McKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & AutomationMcKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & AutomationForgeRock
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Observability in real time at scale
Observability in real time at scaleObservability in real time at scale
Observability in real time at scaleBalvinder Hira
 
Using a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityUsing a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityElasticsearch
 
Securing The Cloud
Securing The CloudSecuring The Cloud
Securing The Cloudgeorge.james
 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home EraNeo4j
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Servicesmartinvoelk
 
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMLogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMDenitsa Dimova
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-managementAmit Bhargava
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed SecurityDarryl Santa
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 

Was ist angesagt? (20)

(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon (SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
How South Dakota's BIT defends against cyber threats
How South Dakota's BIT defends against cyber threatsHow South Dakota's BIT defends against cyber threats
How South Dakota's BIT defends against cyber threats
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdf
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
National Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNational Digital ID Platform Technical Forum
National Digital ID Platform Technical Forum
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
McKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & AutomationMcKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & Automation
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Observability in real time at scale
Observability in real time at scaleObservability in real time at scale
Observability in real time at scale
 
Using a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityUsing a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective security
 
Securing The Cloud
Securing The CloudSecuring The Cloud
Securing The Cloud
 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home Era
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Services
 
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMLogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEM
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 

Ähnlich wie Electronic Data Discovery

DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010dcampbellelite
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010Darrin Campbell
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)Denodo
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...LeMeniz Infotech
 
Big Data Companies and Apache Software
Big Data Companies and Apache SoftwareBig Data Companies and Apache Software
Big Data Companies and Apache SoftwareBob Marcus
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingInside Analysis
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Denodo
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM ChecklistEstuate, Inc.
 
Data virtualization
Data virtualizationData virtualization
Data virtualizationHamed Hatami
 
Modern Data Management for Federal Modernization
Modern Data Management for Federal ModernizationModern Data Management for Federal Modernization
Modern Data Management for Federal ModernizationDenodo
 
Confluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPointConfluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPointconfluent
 
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Nathan Bijnens
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPFidelis Cybersecurity
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 
Accelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data VirtualizationAccelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data VirtualizationDenodo
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationDenodo
 
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data VirtualizationMasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data VirtualizationDenodo
 
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?Denodo
 
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudCloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudRobert Ambrogi
 

Ähnlich wie Electronic Data Discovery (20)

DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
 
Big Data Companies and Apache Software
Big Data Companies and Apache SoftwareBig Data Companies and Apache Software
Big Data Companies and Apache Software
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of Everything
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM Checklist
 
Data virtualization
Data virtualizationData virtualization
Data virtualization
 
Modern Data Management for Federal Modernization
Modern Data Management for Federal ModernizationModern Data Management for Federal Modernization
Modern Data Management for Federal Modernization
 
Confluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPointConfluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPoint
 
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
Accelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data VirtualizationAccelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data Virtualization
 
Key Capibilities.pptx
Key Capibilities.pptxKey Capibilities.pptx
Key Capibilities.pptx
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data Virtualization
 
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data VirtualizationMasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
 
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
 
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudCloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
 

Mehr von Sigma Infosolutions, LLC

Analyse Your Brand's Social Media Performance
Analyse Your Brand's Social Media PerformanceAnalyse Your Brand's Social Media Performance
Analyse Your Brand's Social Media PerformanceSigma Infosolutions, LLC
 
Webservices Based Reporting Using Axis2 and Jasper
Webservices Based Reporting Using Axis2 and JasperWebservices Based Reporting Using Axis2 and Jasper
Webservices Based Reporting Using Axis2 and JasperSigma Infosolutions, LLC
 
Reporting features for b2 bi edi solution provider a pentaho solution
Reporting features for b2 bi edi solution provider  a pentaho solutionReporting features for b2 bi edi solution provider  a pentaho solution
Reporting features for b2 bi edi solution provider a pentaho solutionSigma Infosolutions, LLC
 
A Magento eCommerce Solution_Sigma Infosolutions
A Magento eCommerce Solution_Sigma InfosolutionsA Magento eCommerce Solution_Sigma Infosolutions
A Magento eCommerce Solution_Sigma InfosolutionsSigma Infosolutions, LLC
 
Greenfield development of an enterprise mobile solution
Greenfield development of an enterprise mobile solutionGreenfield development of an enterprise mobile solution
Greenfield development of an enterprise mobile solutionSigma Infosolutions, LLC
 
Sales Force Automation for a Leading Copper Mining Company
Sales Force Automation for a Leading Copper Mining CompanySales Force Automation for a Leading Copper Mining Company
Sales Force Automation for a Leading Copper Mining CompanySigma Infosolutions, LLC
 
Mobile Protection Application Development
Mobile Protection Application Development Mobile Protection Application Development
Mobile Protection Application Development Sigma Infosolutions, LLC
 
Web Services Based Reporting Using Axis2 and Jasper
Web Services Based Reporting Using Axis2 and JasperWeb Services Based Reporting Using Axis2 and Jasper
Web Services Based Reporting Using Axis2 and JasperSigma Infosolutions, LLC
 
Custom Navigation Flow for Jasper Server Reporting Platform
Custom Navigation Flow for Jasper Server Reporting PlatformCustom Navigation Flow for Jasper Server Reporting Platform
Custom Navigation Flow for Jasper Server Reporting PlatformSigma Infosolutions, LLC
 
Social Networking Application Development
Social Networking Application Development  Social Networking Application Development
Social Networking Application Development Sigma Infosolutions, LLC
 

Mehr von Sigma Infosolutions, LLC (20)

Analyse Your Brand's Social Media Performance
Analyse Your Brand's Social Media PerformanceAnalyse Your Brand's Social Media Performance
Analyse Your Brand's Social Media Performance
 
Webservices Based Reporting Using Axis2 and Jasper
Webservices Based Reporting Using Axis2 and JasperWebservices Based Reporting Using Axis2 and Jasper
Webservices Based Reporting Using Axis2 and Jasper
 
Video Survallence Solution
Video Survallence SolutionVideo Survallence Solution
Video Survallence Solution
 
Technology Alliance Partner
Technology Alliance PartnerTechnology Alliance Partner
Technology Alliance Partner
 
Reporting features for b2 bi edi solution provider a pentaho solution
Reporting features for b2 bi edi solution provider  a pentaho solutionReporting features for b2 bi edi solution provider  a pentaho solution
Reporting features for b2 bi edi solution provider a pentaho solution
 
Online reputation management solution
Online reputation management solutionOnline reputation management solution
Online reputation management solution
 
A Magento eCommerce Solution_Sigma Infosolutions
A Magento eCommerce Solution_Sigma InfosolutionsA Magento eCommerce Solution_Sigma Infosolutions
A Magento eCommerce Solution_Sigma Infosolutions
 
Mobile development capability doc
Mobile development capability docMobile development capability doc
Mobile development capability doc
 
Greenfield development of an enterprise mobile solution
Greenfield development of an enterprise mobile solutionGreenfield development of an enterprise mobile solution
Greenfield development of an enterprise mobile solution
 
Implement Openbravo ERP with webstore
Implement Openbravo ERP with webstore Implement Openbravo ERP with webstore
Implement Openbravo ERP with webstore
 
Magento eStore Solution
Magento eStore SolutionMagento eStore Solution
Magento eStore Solution
 
Sales Force Automation for a Leading Copper Mining Company
Sales Force Automation for a Leading Copper Mining CompanySales Force Automation for a Leading Copper Mining Company
Sales Force Automation for a Leading Copper Mining Company
 
Outbound Reservation Management System
Outbound Reservation Management System Outbound Reservation Management System
Outbound Reservation Management System
 
Mobile Protection Application Development
Mobile Protection Application Development Mobile Protection Application Development
Mobile Protection Application Development
 
B2B Printing Solution
B2B Printing Solution B2B Printing Solution
B2B Printing Solution
 
Mobile Development Capability
Mobile Development Capability Mobile Development Capability
Mobile Development Capability
 
Web Services Based Reporting Using Axis2 and Jasper
Web Services Based Reporting Using Axis2 and JasperWeb Services Based Reporting Using Axis2 and Jasper
Web Services Based Reporting Using Axis2 and Jasper
 
Custom Navigation Flow for Jasper Server Reporting Platform
Custom Navigation Flow for Jasper Server Reporting PlatformCustom Navigation Flow for Jasper Server Reporting Platform
Custom Navigation Flow for Jasper Server Reporting Platform
 
Social Networking Application Development
Social Networking Application Development  Social Networking Application Development
Social Networking Application Development
 
Web based reporting system
Web based reporting system Web based reporting system
Web based reporting system
 

Electronic Data Discovery

  • 1. Reduced Cost and Time-of-Retrieval by developing intelligence over an existing Electronic Data Discovery tool for a Litigation Support Services Provider
  • 2. T h e c l i e n t s e r v e s l e a d i n g corporations, law firms and government agencies through their broad range of litigation and business consulting services. Dealing with large amount of data, the client wanted a seamless electronic data discovery tool that would provide them digital archival and retrieval of data so as to ensure security and reliability for future reference. The c l i e n t a p p r o a c h e d S i g m a Infosolutions to leverage their expertise on Electronic Data Discovery and develop a robust tool that could automate large scale data search and retrieval. This tool will integrate with the suite of e- discovery solutions already offered by the client. Headquartered in Seattle, the client is a premier provider of broad range of litigation & business consulting services to corporations, law firms and government agencies across NorthAmerica. The ClientExecutive Summary The client initially used DT Search for retrieving sensitive data from its customers’ network. However, every time the discovery needed to be performed, a thin client had to be installed on its customers' network. This limited flexibility resulted in the client having to manually share and unshare the drives in the network and also manually copy the information to a specific location. The client wanted a domain expert to design, build,and test an electronic data discovery tool that would provide centralized access to all necessary data needed for zero defect archival & retrieval. They also wanted the tool to automatically save a copy of the extracted data onto a preferred location and archive to a common repository when the client plugged back into its own network. This solution would also improve the overall performance of the EDD process. Business Case sales@sigmainfo.net Challenges The client was often working with sensitive data and could not afford to compromise on the integrity of the data. This was a significant challenge for the successful operation of this tool. Also, the tool needed to remove traces of all activity to ensure security compliance and prevent network vulnerability. Since the client would plug itself into their customers' network during this discovery, the tool had to have the capability to crawl across the network, share the drives, extract data and then unshare drives to ensure minimal data pilferage risk. While testing, it was a challenge to simulate up to 1700 boxes and such large data silos. Preventing network hacks and vulnerability on the network during extraction was a significant challenge. Solution Sigma Infosolution’s team worked closely with the client's team to design and develop MARCO - comprising of 3 modules namely eDiscovery, Indexing, and Search Engine. MARCO was implemented as an intelligent solution layer onto 30% time savings during discovery and retrieval of e-documents “
  • 3. Technology  J2EE  .NET components  SQL Server 2000 database used for storage. Compatible with Oracle & MySQL  Hibernate used as ORM tool for efficient connection pooling  Supports exchange server indexing (compatible with Exchange Server 2000 & above Business Benefits Key benefits included:  Cost effective tool to review a large set of data in their native format  Faster indexing at a speed of 4-5 GB of data per hour  Supports Microsoft Exchange indexing along with files systems and various document formats  Supports all the searching features extended by DT Search  License Free Software with complete ownership  Capability to support context based search for analysis the existing DTsearch framework to develop a centralized web-based application that would offer the combined powerful search capabilities across an enterprise network. MARCO supported all the basic search types like boolean, phrase or proximity based, along with fuzzy searching, relevancy ranking and natural language based searching. MARCO was built to be installed on an individual laptop of the client's executive and when connected to an enterprise's network would act as a portable server to completely automate the document retrieval process. It would:  Automatically crawl into the network to detect the numerous Microsoft Windows OS based heterogeneous boxes like e-mail servers, network servers, backup tapes, desktops, laptops, PDAs, etc.  Automatically share main drives of these boxes on the network to perform indexing  Index all the documents stored in various electronic file formats  Perform search on the indexed set of documents to acquire the data as per client's requisites  Automatically save a local repository of the entire set of documents searched on to the client's portable server  Automatically un-share all the various systems attached  Perform filtering by removing duplicate and other non-responsive files to retrieve the exact set of e-documents The entire solution was developed, tested and deployed with zero variance on schedule and budget. www.sigmainfo.net
  • 4. About Sigma Infosolutions  Sigma Group, an Indian conglomerate has more than 4 decades of experience in Mining, Chemicals Manufacturing & Export, Handicrafts Manufacturing & Exports, and Software Development  Sigma Infosolutions is a TUV certified ISO 9001:2008 & ISO 27001:2005 company  Headquartered in US with presence in India  Some of our esteemed customers include Airtel, Zyme Solutions, Yodlee, Celerity Consulting, Resolution Economics, Birla Global Asset Finance, Fosroc Chemicals, Surgery Planet etc.  Sigma Infosolutions’ services comprises of application development, application management, IT Consulting, Offshore testing, and Website and Portal Development Sigma Infosolutions, Sigma Towers, #66/A, 13th Cross 6th Main, JP Nagar, 3rd Phase, Bangalore- 560078 Telephone: +91-80-40865100 Sigma Infosolutions, 2082 Michelson Dr. Suite 100, Irvine, CA 92612 Telephone: +1-714-717-1826 Fax: +1-866-405-6750, Toll Free: 1-888-861-7360 Website: www.sigmainfo.net E-mail: sales@sigmainfo.net Toll Free: 1-888-861-7360