Insights From Your Data
Data Mining and Analytics are always the first steps of an audit; this toolset is customized to the engagement and offers a superior ability to manage the data needed to conduct an accurate and robust Recovery Audit.
This email & document discovery tool easily categorizes, filters, and searches through millions of emails and other documents in seconds, allowing for comprehensive reviews of the files that are frequently the most difficult to work with.
We developed intuitive software that places the power of the audit at your fingertips. Audit progress and insights at your fingertips, 24 hours a day, 7 days a week.
Protecting Your Data
Once your data is received by our data warehouse, it is in secure hands.
LocationAll processing, analytics, and audit work are performed securely within the data center
- Unless specifically required for transmission to/from a client, transactional data never leaves and never resides on individual laptops
- All data (live and backup) is encrypted at rest
Data never leaves the United States
Logical AccessAccess to data is secured by multiple layers of control
- Audit and IT staff must be explicitly assigned to work on an audit before a client’s data is accessible to them.
- Two-factor authentication is required to access the client data environment.
Physical AccessHighly secure Data Center environment
- Latest in Data Center physical security, scalable hardware performance, and redundancies.
- Complies with key industry standards, such as ISO/IEC 27001:2013 and NIST SP 800-53, for security and reliability.