Why (and how) in-place Early Data Assessment is a gamechanger

One of the biggest challenges for modern eDiscovery is the sheer volume of Electronically Stored Information (ESI) most organisations have in play. This volume has made the traditional method of Early Data Assessment (EDA) – whereby custodians are first identified, and all their data collected and ingested into a review platform before EDA begins – […]

What is Cognitive Analytics and how is it applied in eDiscovery?

In generic terms, cognitive analytics is the process of applying human-like intelligence to unstructured data in order to enrich the value we can extract from it. It’s inspired by the way the human brain processes information, using a combination of experience-driven instinct and learning to join the dots and draw meaningful conclusions. In eDiscovery terms, […]

Discovery Risk Mitigation – Preservation

Data Preservation

Should It Stay or Should It Go? A terrible wordplay on The Clash’s 1981 classic perhaps, but to retain or dispose of data is a core theme in this, the last piece in our Discovery Risk Mitigation series of blogs. You’ll recall the previous discussion that Information Governance is increasingly both a critical aspect of […]

Discovery Risk Mitigation – Remediation


Improving preparedness to eDiscovery events In the previous article, we explored considerations when assessing your current eDiscovery and information governance maturity.  Having undertaken that exercise and established a benchmark, clearly, the next step is to implement a series of corrective measures. But where should you start? What demands your most immediate attention, and what can […]

eDiscovery Maturity Assessment

eDiscovery Maturity Assessment

Assessing your corporate capability to respond effectively to investigations and eDiscovery events. In an earlier post, I introduced Discovery Risk Mitigation, our structured journey-based approach to helping organisations reduce their exposure to the risks inherent within the ever-expanding data and governance landscapes in which we now work. Having understood why preparedness is a good thing […]

Discovery Risk Management

A worker using Salient Discovery's eDiscovery service

Mitigating the eDiscovery risks due to the explosion of electronic data in your business through a structured programme of preparedness. Being Prepared I’m sure most people are familiar with the expression “prevention is better than cure”. It sounds like generally sound advice to me and I’m sure most would probably agree. But in truth, to […]

Salient’s New Utility Unlocks Tech-Assisted Bank Statement Analytics

bank statement analytics

Technology has a gone a long way towards streamlining investigations, but one particular area of evidence has consistently flown under the radar of all the usual forensic tools: bank statements. “Following the money” using these transactional documents is often a pivotal part of investigations, and yet it has remained an arduous manual process that guzzles […]

How to Keep Employee Monitoring on the Right Side of Data Privacy Laws

How to Keep Employee Monitoring on the Right Side of Data Privacy Laws

Monitoring employee conduct has always been part of the corporate environment. In many cases, it’s an essential component of prevention strategies for data leaks, fraud, theft of intellectual property and other potentially harmful behaviour. Monitoring also enables organisations to supervise and manage productivity, enforce organisational policies and procedures, manage quality control and protect employees and […]

Insider Risk Management and the Power of Proactive Threat Detection

Insider Risk Management and the Power of Proactive Threat Detectionr of proactive threat detection

Many businesses are under the impression that the biggest risk to their data security comes from external cyber-attacks breaching their perimeter. In our experience investigating security breaches, however, we can confidently say that equally damaging threats can often come from within. Whether you’re talking unintentional data spillage, malicious IP theft, confidentiality breaches, regulatory compliance violations, […]

Using Cognitive Analytics to Expose Leading Indicators and Build Fact Patterns

Using Cognitive Analytics to Expose Leading Indicators and Build Fact Patterns

It is generally accepted that the single largest cost in addressing any eDiscovery exercise is neither the technology nor the litigation support teams employed, but rather it is the cost of lawyer review time. And that makes perfect sense. After all, you are paying for the lawyers’ understanding of the law and experience of its […]