New Product Increases Control Over e-Discovery

Monday, April 2, 2012 - 11:55

A revolutionary and new-to-market solution from VeDISCOVERY LLC gives control of the litigation hold process to corporate legal decision makers who need to identify and collect electronic stored information (ESI) while reducing collection costs a minimum of 50 percent.

VeHOLD with VeAGENT automates the litigation hold process. VeHOLD is a remotely installed and controlled software solution that identifies, filters and transmits only relevant data from custodians anywhere on a network to a centralized and secure storage location.

“Manually collecting data for preservation or investigation is an aggravation for IT staff when you have more than a few litigation hold orders to manage,” says Ron Copfer, partner of VeDISCOVERY. “VeHOLD enables you to collect and preserve almost any type of data over your network without physically taking computers from users for hours or days or shutting down email and file servers while data is being collected.”

VeDISCOVERY is a complete and end-to-end software-as-a-service (SaaS) e-discovery provider with VeHOLD, VeANALYTICS and VeREVIEW™ in as its software solutions suite for corporate customers. The company also offers computer forensic services and data collection, processing and hosting for corporations and law firms.

“VeHOLD with VeAGENT offers several advantages over manual collection procedures,” Mr. Copfer said.

Java-based VeAGENT technology can be installed in seconds on any laptop, desktop or server to gather ESI using criteria set remotely by an authorized administrator. VeAGENT works in the background and sends only filtered data to a secure storage location, eliminating the need for someone to physically mirror each custodian or shut down any machine.

“The central command center is straightforward, enabling attorneys to initiate a hold process,” says Mr. Copfer. “VeAGENT will find documents from individuals anywhere on a network, including locations other than a custodian’s primary device. And it can continue to proactively capture and send revised data to improve defensibility.”

Traditional litigation hold solutions require physically going to a machine and mirroring the drive within it. This procedure is time consuming and the device being mirrored cannot be used during the process. VeAGENT is especially useful where frequent travelers rely on laptops as a primary work device. Additionally, if mirrored data being collected is unfiltered, it creates significant storage and processing demands at the next step in the process.

“VeAGENT’s first-pass data filtering at the custodian level means that only potentially relevant data is collected and stored,” Mr. Copfer continued. “This minimizes the volume of ESI data that must be stored, processed and secured often by as much as 80 percent, which limits the load on other business critical IT infrastructure and human resources.”

Manual forensic mirroring of drives is still required for defensibility where there is suspicion that relevant data has been deleted. “A future version of our VeAGENT software will include detection of potentially relevant files that have been deleted,” Mr. Copfer mentioned.

Because the VeDISCOVERY suite is modular and SaaS-based, it can be implemented quickly for individual functions and as a complete solution. Access through a secure web portal can be done from any location with internet access.

“Our cloud-based e-discovery applications can be implemented quickly while minimizing the load on corporate IT staff and resources. You can install the entire suite or just an individual module,” Mr. Copfer continued. “We can work with companies wherever they are in the development of their e-discovery process and with practically any existing application they might currently be using.”

 “VeHOLD with VeAGENT makes it easier for corporate counsel to control the collection of defensible electronic documents with less dependence on IT resources,” Mr. Copfer said. “However you implement them, our solutions provide a huge improvement over complying with electronic evidence requirements through conventional labor intensive and potentially non-defensible manual procedures.”