Using the right tools for digital examinations

Have you ever been sent looking for something, but it wasn’t where it was supposed to be? We’ve all been there. Wallet, car-keys, children’s schoolbooks! Irritating, sure. A…

OpenText  profile picture
OpenText

October 12, 20202 min read

Have you ever been sent looking for something, but it wasn’t where it was supposed to be? We’ve all been there. Wallet, car-keys, children’s schoolbooks! Irritating, sure. A waste of time, definitely. But not the end of the world, right! 

But what if what you’re looking for is a key piece of digital evidence in a criminal prosecution? Or a vital document in a competition or M&A investigation? You’re given a drive, or endpoint location and asked to find the needle in the haystack. So, where do you begin? And how do you prevent a minor irritation from becoming something far more serious? 

Today’s digital environments are complex and massive. They can hold terabytes of information including files, contacts, documents, and imagesto emails, social media, and user-generated content. They also contain the fragments left behind when someone knows they are being investigated and are trying to stay one step ahead.  

This digital evidence can be vital to an internal investigation or legal case your company needs to defend itself in.  

In 2016, IBM found that 60% of all cyber-attacks were carried out by insidersThe Council of Economic Advisors determined that malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 2016. People conducting malicious activity internally will try to hide their tracks, but you can find evidence of their behavior with the right tools.  

Providing the right information by having a forensically repeatable process and by being able to locate the specific evidence allows you to identify and collect what you need without introducing superfluous information, saving time, and storage of data. 

Losing something under a sofa doesn’t typically come with a substantial financial loss. Losing intellectual property at the hand of a disgruntled employee, or losing a contract dispute with a competitor, can run into millions in lost time, profits, and ancillary damages.  

The bottom line, if you can’t find what you’re looking for or if it’s not in the right place, you need proper investigative tools that ensure you have a repeatable, defensible process that will stand up in a court of law. 

See how OpenText can help. 

Authored by Scott Saldinger, Sr. Account Executive, OpenText and Mike Stone, Sr. Account Executive, OpenText.

Share this post

Share this post to x. Share to linkedin. Mail to
OpenText avatar image

OpenText

OpenText, The Information Company, enables organizations to gain insight through market-leading information management solutions, powered by OpenText Cloud Editions.

See all posts

More from the author

From the Great North to global innovation: How OpenText powers the future of tech

From the Great North to global innovation: How OpenText powers the future of tech

The beginning of the year is the perfect time to reflect on one’s successful journey and set our sights on the future. At OpenText, our…

February 28, 2025

3 min read

Why SAST + SCA is the key to protecting your organization in 2025

Why SAST + SCA is the key to protecting your organization in 2025

Software supply chain risk continues to rise—just last year we witnessed a staggering 156% year-over-year increase in malicious software supply chain attacks.

January 17, 2025

4 min read

All we want for Christmas:  An open letter to Santa from a modern legal team  

All we want for Christmas:  An open letter to Santa from a modern legal team  

As legal professionals embracing digital transformation, our wish list is a bit different this year.

December 11, 2024

4 min read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.