HOME | FEATURES | ABOUT | REQUEST A DEMO | CONTACT
The Process
iSEEK gives you the power to rapidly and intelligently identify and collect the amount data you want, eliminating costly and burdensome low value content. Here's how:
1. Define Your Search: The Configuration File
The Configuration file directs the search and capture process according to the information inputted by the user. Users can set search parameters to include files, emails and/or archives. Then, they can refine the results by keywords, date range, file and email type, or one of iSEEK’s many other categories.
2. Run the Search: The Executable
Deploy searches locally or remotely with iSEEK’s Executable component. Users can employ external media such as thumb drives or auto-executing CDs or run iSEEK through login scripts or emails. All results are fully encrypted and can be sent to designated emails or the Cloud.
3. Analyze Results: iVAULT
Use the iVAULT environment to examine the results in-depth for responsive information. iVAULT
enables users to:
• View hundreds of file types
• Search within results using two search engines and a built-in email search feature
• Tag specific objects
• Create Adobe-formatted reports
• Create encrypted data containers for later review
<< Home