Simple. Powerful. Precise.

Request a demo


cybersecurity CTAT team
Thursday July 9 | 9am PT / 12pm ET / 5pm BST

Join Nuix’s cybersecurity professionals for our latest quarterly threat briefing as we discuss the next evolution of hacker methodology and how to determine if your trust network can be used against you.

2015 Microsoft Worldwide Partner Conference
July 12 - 16, 2015

The 2015 Microsoft Worldwide Partner Conference is the must-attend event for Microsoft partners.

August 30 - September 3, 2015

This year's ILTACON will offer a stellar lineup of keynote speakers, educational panel discussions, hands-on training and attendee-driven sessions.

Blog Posts

Sweets in jars

Perimeter security is simply not enough to protect sensitive data from external and insider breaches. Knowing your data, inside and out, is the only way to truly mitigate the risk of losing it. 

Man wearing an ugly tie, using a smartphone

Many companies have in place or are implementing “bring-your-own device” (BYOD) policies. While this may make CFOs and employees happy, BYOD policies present unique challenges for legal and IT departments.

Keith Lowry addressing the Information Governance and eDiscovery Summit

Dealing with insider threats requires a program, not just a piece of software. But you can’t leave technology out of the solution.

What's new at Nuix

Digital Forensics Magazine - Embracing eDiscovery

According to Paul Slater, you can meet the demands of today's digital investigations with the budget of 10 years ago.

Learn more

What our clients say

“No software other than Nuix can process large collections fast enough to meet the SEC's desired timeframes.”

U.S. Securities and Exchange Commission

Find out what other customers have said about us