• 1 Identify

    Initiate and manage legal hold, identify key players, custodians, and locations
  • 2 Preserve & Collect

    Perform a forensically defensible collection—one that preserves that all files and associated metadata remain unchanged
  • 3 Assess & Strategize

    Develop tailored forward-looking, and repeatable solutions and execute best practice workflows
  • 4 Cull & Process

    Reduce data sets using deduplication, deNISTing, file type, date range, and search terms before review
  • 5 Review

    Determine right technology fit, design efficient workflow, and provide expert project management
  • 6 Produce

    Exchange relevant, responsive data in most cost-effective and compliant manner