Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Guidance Software Updates eDiscovery Tool

Guidance Software, a provider of digital Forensics and E-Discovery solutions, today announced the release of EnCase eDiscovery 5.2, the latest version of the company’s e-discovery software designed to provide in-house counsel with control and oversight throughout the e-discovery process.

Guidance Software, a provider of digital Forensics and E-Discovery solutions, today announced the release of EnCase eDiscovery 5.2, the latest version of the company’s e-discovery software designed to provide in-house counsel with control and oversight throughout the e-discovery process.

The updated version brings additional legal hold control, military-grade encryption, and faster data transfer to the EnCase eDiscovery Review platform.

The legal hold features included in EnCase eDiscovery now help streamline the management of custodians by allowing for designation of individuals within a group as “inactive” or “active”, the company said.

Higher levels of security comes as a result of AES-256 encryption for collected data, providing high level encryption for sensitive data residing in the cloud or in other areas outside of the corporate network. Users can set encryption options when the job is created and also lockdown access to their global repository with secure tracking and administration of keys and passwords, the company said.

File transfer speed to the SaaS-based EnCase eDiscovery Review platform is also improved in Version 5.2, allowing review teams to begin their work more quickly and efficiently. Performance-wise, the improvements are two-fold for the file transfer speed to the its SaaS-based EnCase eDiscovery Review platform. Packet compression has also been added, further reducing data volume and transfer time.

Additionally, in-house counsel also has access to real-time data integrity reports that track network transmission status to provide transparency into the data-transfer process.

“As data volumes continue to skyrocket, legal holds grow in complexity and difficulty with each additional day of forwarded emails, downloaded documents and corporate data walking out the door on personal devices,” said David Horrigan, Esq., E-Discovery and Information Governance Analyst at 451 Research. “Those of us who have served as in-house counsel appreciate the need for new technologies to improve legal hold and litigation preparation processes.”

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.