Our Technology

Insights From Your Data

Image
Data Mining and Analytics are always the first steps of an audit; this toolset is customized to the engagement and offers a superior ability to manage the data needed to conduct an accurate and robust Recovery Audit.
Image
This email & document discovery tool easily categorizes, filters, and searches through millions of emails and other documents in seconds, allowing for comprehensive reviews of the files that are frequently the most difficult to work with.
Image
We developed intuitive software that places the power of the audit at your fingertips. Audit progress and insights at your fingertips, 24 hours a day, 7 days a week.

Protecting Your Data

Once your data is received by our data warehouse, it is in secure hands.

Image

Location

All processing, analytics, and audit work are performed securely within the data center
  • Unless specifically required for transmission to/from a client, transactional data never leaves and never resides on individual laptops
  • All data (live and backup) is encrypted at rest
  • Data never leaves the United States

Image

Logical Access

Access to data is secured by multiple layers of control
  • Audit and IT staff must be explicitly assigned to work on an audit before a client’s data is accessible to them.
  • Two-factor authentication is required to access the client data environment.
Image

Physical Access

Highly secure Data Center environment
  • Latest in Data Center physical security, scalable hardware performance, and redundancies.
  • Complies with key industry standards, such as ISO/IEC 27001:2013 and NIST SP 800-53, for security and reliability.