Our Technology
Insights From Your Data
Data Mining and Analytics are always the first steps of an audit; this toolset is customized to the engagement and offers a superior ability to manage the data needed to conduct an accurate and robust Recovery Audit.
This email & document discovery tool easily categorizes, filters, and searches through millions of emails and other documents in seconds, allowing for comprehensive reviews of the files that are frequently the most difficult to work with.
We developed intuitive software that places the power of the audit at your fingertips. Audit progress and insights at your fingertips, 24 hours a day, 7 days a week.
Protecting Your Data
Once your data is received by our data warehouse, it is in secure hands.
Location
All processing, analytics, and audit work are performed securely within the data center- Unless specifically required for transmission to/from a client, transactional data never leaves and never resides on individual laptops
- All data (live and backup) is encrypted at rest
-
Data never leaves the United States
Logical Access
Access to data is secured by multiple layers of control- Audit and IT staff must be explicitly assigned to work on an audit before a client’s data is accessible to them.
- Two-factor authentication is required to access the client data environment.
Physical Access
Highly secure Data Center environment- Latest in Data Center physical security, scalable hardware performance, and redundancies.
- Complies with key industry standards, such as ISO/IEC 27001:2013 and NIST SP 800-53, for security and reliability.