Alex Chatzistamatis (Principal Solutions Consultant) More Post By this Author: Answering Your Questions About Our Microsoft 365 Connector Microsoft 365 is exploding, forcing organizations to adapt to handle the influx of data generated by users of all types. We had the great opportunity to present a demo of our Microsoft 365 connector during a webinar on… 25 Jan 21 Building Unstructured Data Solutions for Today and Tomorrow: Part 6 – Wrapping Up During the few weeks that it took me to complete this blog series, several things have changed. Many organizations have opted to allow employees to work from home for the foreseeable future, collaboration tools like MS Teams… 07 Oct 20 Building Unstructured Data Solutions for Today and Tomorrow: Part 5 – Review & Export After a brief break (welcoming my newborn son to the world), I’m back and have been looking forward to writing the fifth chapter in this series! Looking back at the previous editions of this series, I’ve focused on key… 03 Sep 20 Building Unstructured Data Solutions for Today and Tomorrow: Part 4 – Explore & Analyze If you’ve been following along with this series so far, you know that we’ve covered some of the most critical components of the EDRM (collections and processing) and mapped these to Nuix technology that can be used to build… 23 Jul 20 Building Unstructured Data Solutions for Today and Tomorrow: Part 3 – Processing & Preparation Now that we’ve covered collections—what I believe is a foundational component to an unstructured data solution—I think it’s time to focus on easily the most important requirement: processing. Continuing with the concept… 29 May 20 Building Unstructured Data Solutions for Today and Tomorrow: Part 2 – Endpoint & Cloud Collection Most organizations that deal with investigations or litigation will typically need a way to collect and preserve data stored on endpoints across their enterprise. While collection is generally not the most expensive stage of… 12 May 20 Building Unstructured Data Solutions for Today and Tomorrow: Part 1 “Is there a way to create a reusable data repository for my most frequently litigated custodians and their privileged data?” “What kind of sensitive data is there on my endpoints?” “Can I combine multiple data types… 01 May 20 What To Do When Your Key Evidence Is Also Working from Home You may not remember the last time you weren’t wearing slippers, or what it’s like to be on a conference call in total peace and privacy, and you certainly aren't alone. Despite shifting dietary, fashion, and habitual norms… 30 Mar 20 Using Ten Dimensions of Data to Make Fact-based Decisions No matter what kind of organization you work for or with, you’re challenged to make fact-based decisions every day. This holds as true for incident responders looking into potential misuse of company resources as it does for… 19 Mar 20 Harness the Magic of Worker-side Scripting These days, as soon you become accustomed to one thing, something new comes along to make the old way pale in comparison. These sorts of changes are a constant, especially in the technology industry. While you may be… 02 Oct 19 Exactis Leak Shows Importance of Securing Elasticsearch Data This week, US-based marketing firm Exactis made headlines for the possible data leak of over 340 million personal records. Think about that for a second: 340 million. That’s more records than the official population in the… 28 Jun 19