HOME    |    FEATURES    |    ABOUT    |    REQUEST A DEMO   |   CONTACT

The Process

iSEEK gives you the power to rapidly and intelligently identify and collect the amount data you want, eliminating costly and burdensome low value content. Here's how:

1. Define Your Search: The Configuration File

 

The Configuration file directs the search and capture process according to the information inputted by the user. Users can set search parameters to include files, emails and/or archives. Then, they can refine the results by keywords, date range, file and email type, or one of iSEEK’s many other categories.

 

2. Run the Search: The Executable

 

Deploy searches locally or remotely with iSEEK’s Executable component. Users can employ external media such as thumb drives or auto-executing CDs or run iSEEK through login scripts or emails. All results are fully encrypted and can be sent to designated emails or the Cloud.

 

3. Analyze Results: iVAULT

 

Use the iVAULT environment to examine the results in-depth for responsive information. iVAULT

enables users to:

 

• View hundreds of file types

 

• Search within results using two search engines and a built-in email search feature

 

• Tag specific objects

 

• Create Adobe-formatted reports

 

• Create encrypted data containers for later review

<<  Home

Home     |     Contact      |     Partners      |

© iSEEK 2015. All rights reserved.

Request a Demo