203 Lotus blogs updated hourly. Who will post next? Home | Blogs | Search | About 
Latest 7 Posts
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 2
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 7
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 2
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 7
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 3
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 4
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 1
Top 10
Cloud Computing: Is the Risk Worth the Reward?
Fri, May 2nd 2014 8
Off the topic: Become a tailgating all-star
Thu, Nov 5th 2015 8
Top 10 Horror Movies for Halloween
Thu, Oct 29th 2015 7
Important Exchange 2016 Information for Mail Attender Clients
Tue, Nov 3rd 2015 7
Off-the-topic: 5 Winter Getaway Ideas
Tue, Feb 9th 2016 7
How IT can take the lead in Information Governance projects
Wed, Apr 20th 2016 7
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 7
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 7
White Paper: Implementing an Information Governance Program
Thu, Apr 3rd 2014 6
Best (but not most followed) practices
Wed, May 21st 2014 6

Coming Soon for Discovery Attender, Version 3.92
Twitter Google+ Facebook LinkedIn Addthis Email Gmail Flipboard Reddit Tumblr WhatsApp StumbleUpon Yammer Evernote Delicious
Marta Farensbach    

At Sherpa Software, we believe that customer feedback is the key ingredient in creating a reliable product and a credible brand.  Your requests certainly formed the backbone of new features we will be including in Discovery Attender 3.92, which is currently under development.  Users have been clamoring for enhancements in three particular areas: reporting, performance, and more search options.  We’re happy to report that the new functionality for 3.92 addresses updates in all these areas.

Scan Snapshots

Users have requested the ability to retrieve statistics from their data stores without running a complete (and potentially time-consuming) search.  Oftentimes, they are given a batch of PST files named ‘archive.pst’ or ‘outlook.pst’, but have no idea of the custodians, number of messages or even internal folder structure of these files. To help solve this problem, Discovery Attender 3.92 will include new ‘Scan’ options deployed independently of standard, criteria-based searches.  Snapshots are designed to be quick, displaying information about message counts, folder listings, date ranges and more within minutes.  The Detailed choice will take a bit longer, but will be worth it as it nets date ranges, message types, attachment counts and more. These options will help you better plan your discovery without sacrificing hours in searching time.


Speed and database limitations are areas where users seek constant improvement. Fortunately, version 3.92 offers enhancements in both areas as well. New options have been included to allow faster searches and handle larger result sets while minimizing database errors.

Search Criteria

Just when we think we’ve seen all the combinations of syntax the eDiscovery world has to offer, novel variants arrive to surprise us.  To help deal with the ever more complex requests, we are adding new criteria options for Addresses and Keywords, while including date and size options to join file types for the useful Custom Exception feature.

Managing Results

Once searches are complete, users deploy Discovery Attender’s myriad of organizational options to deduplicate, filter and cull down their data sets. Version 3.92 has added a variety of features to provide further assistance with these tasks. Deduplication is improved by adding additional options including custodians, optional SHA1 hashes, and identifying ‘master’ data stores.  Export actions have not been neglected;  the new version will see improvements in long path handling, sealed container options and ad-hoc Bates numbering among others.

Views & Statistics

Discovery Attender collects a substantial amount of metadata as it conducts its searches. However, much of this information is tucked away in databases. This makes it difficult to collate specialized information for average users who don’t wish to delve into the depths of SQL queries and back-end tables. Version 3.92 will give users better visibility to help analyze their results and pinpoint useful information.  Planned views and reports include:

  • Statistics for Unique items, Labels and Marks
  • Drill down date histograms
  • Improved family reporting to give accurate ‘total set’ counts
  • Keyword reports including solo counts, addresses by term, popular keywords

We hope you are as excited as we are about the new features for Discovery Attender 3.92, due in early 2016.  As the development for this version is currently in progress, the details of the features are subject to change, but we think you will be happy with the end result.  Please don’t hesitate to contact us with questions or comments.  We’d love to hear from you!


The post Coming Soon for Discovery Attender, Version 3.92 appeared first on Sherpa Software.

Nov 05, 2015
5 hits

Recent Blog Posts
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 2:25p   Jeff Tujetsch
Ways to avoid Information Governance pitfalls Information Governance (IG) -It sounds like it is a very extensive process because unfortunately, it is.  There are many components to IG, with the two major players being software and people. In this article, I will try to expose possible issues that you can hopefully avoid. For those of you that have had school-age kids, you can attest to the kids succeeding more when a routine is established and followed. So why am I talking about routine? Beca
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 1:21p   Marta Farensbach
Various privacy laws and other data security regulations detail how private, financial, and other confidential records should be handled. These rules cover the usage and storage of data, such as credit card numbers, social security numbers, social insurance information, and health care records. As described in a previous blog article, having this Personally Identifiable information (PII) or Payment Card Industry (PCI) data loose in your system can cause all kinds trouble, ranging from fi
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 4:25p   Harvey Coblin
With the proliferation of portable electronic devices, increasing numbers of professionals are preferring to carry their own smart phones, laptops, tablets, etc. to use for work-related purposes. Rather than transporting duplicate devices to distinguish between professional vs. personal data, employees can work where and when they please and with hardware and applications they are already familiar with. It is estimated worldwide that one in three employees are utilizing personal devices at the
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 1:13p   Rick Wilson
If your organization has international operations in the European Union, you should be planning for GDPR compliance now! The General Data Protection Regulation (GDPR) is set to become the overriding data protection regulation with the EU. It was adopted by the European Parliament Council and Commission in 2015, took effect in 2016 and enforcement is scheduled to begin in May of 2018. At its core, the GDPR is intended to provide citizens of the EU with greater control over their personal data
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 6:04p   Marta Farensbach
Today’s compliance, litigation, and regulation-heavy business environments introduce a number of challenges for busy IT professionals. Ignoring any of these areas, as well as failing to implement a strong Information Governance (IG) platform, can introduce substantial risk into your organization. In the worst cases, data breaches, adverse judgements, or non-compliance penalties could thrust a company into the glare of national headlines. Poor policy can affect more than just the finances of a
FOIA reforms are on the way, are you ready?
Wed, Jun 22nd 2016 2:06p   Rick Wilson
If you are employed by a federal government agency, then you are probably well aware of FOIA, or the Freedom of Information Act. FOIA was originally signed into law during the 1960’s by then President Lyndon B. Johnson to establish a process whereby citizens can request copies of governmental records that are not published in the Federal Registry. Agencies, in turn, are required to provide this information in a timely fashion (usually 20 days). Although FOIA is a federal mandate, it has also
Breach of Security: Measuring the Cost of Cyber Crime
Wed, Jun 8th 2016 2:10p   Harvey Coblin
Cybercrime is an increasing threat. Estimates vary widely, but according to a recent Reuters article, “Cyber crime costs (the) global economy $445 billion a year.” Other estimates place the costs as high as $1 trillion. The reason estimates vary is due in part to the fact that cybercrime can come in many forms, ranging from denial of service, theft of credit card or other financial information  (PCI/PII), industrial espionage, all the way up the ladder to state-sponsored terroris
How to Survive Data Discovery in the Digital Age
Wed, May 18th 2016 12:42p   Jeff Tujetsch
eDiscovery. That one word will make IT professionals start shaking. But, as the most technologically advanced civilization in the world, why is that? Is it because of what will be found? Is it because of what they are asked to search? Or is it because of the search terms they are asked to use? Well, the answer to each question is ‘Yes’. Data Discovery has grown into a multi-billion dollar world-wide business. Though the United States might lead the way because of our litigiousness,
Information Governance and the Internet of Things
Wed, May 11th 2016 2:28p   Marta Farensbach
Machines talking to machines.  Once the province of science fiction, the Internet of Things is set to transform industries as visionaries incorporate its wide reach into everyday objects. On a very simple level, the Internet of Things (IoT) describes the freeing of communication from the domain of computers and smart phones by allowing all types of devices to share information across the internet.  ‘Things’ like cars, fridges, health monitors, water meters and so much more can be empower
WHITE PAPER: Implementing Office 365: Inherent Features and the Need for Third Party Tools
Wed, May 4th 2016 12:59p   bhat67i
In this white paper, the topic of Office 365 and complementary solutions will be discussed; insights will be offered on a business’ future migration plans and knowing the options available. One will learn:  Why Office 365 is a compelling platform, Examples of productivity integrations, About the importance of information governance integration, Supplementing with third party software Click here to download this white paper! The post WHITE PAPER: Implementing Office 365: Inherent Fea

Created and Maintained by Yancy Lent - About - Planet Lotus Blog - Advertising - Mobile Edition