Atlanta, GA 30305,USA
+1.678.915.1662
info@sullivanstrickler.com

Services

Tape Amalgamation

It’s a common problem that all companies that have backed up or archived many tapes over many years may have. Unidentified tapes that cannot be destroyed, or specific backup sessions that can be destroyed but cannot be selectively isolated. Now you can do either or both with TRACS TDF/TSF.

1

TRACS/TDF

We can fit the physical volumes of say 150 DLT4 tape cartridges onto one LTO7 tape cartridge. We create image files (.tdf – tape duplicate file) of volumes and collect file level metadata as we go which can be imported to Invenire for immediate ability to find files. The native application database/TMS (Tape Management System) need never be altered, or it can be replaced by Invenire. The result is instead of vaulting perhaps 100,000 tapes instead it would be less than 700, Access to source data can be found immediately and restored quickly, directly from the LTO7 device.

2

TRACS/TSF

If you want specific backup sessions to be retained (say exchange) but not others, we can do that with the creation of an image file (.tsf – tape session file). We take the session from single instance or multi-threaded backup environments and effectively remediate or refresh backups without having to incur the costs and time to restore the backups. The value could be immense in being able to remediate non legally held or compliance specific data from backups without massive data restoration costs. This is a valid service solution for certain aspects of the new GDPR (General Data Protection Regulation)

SullivanStrickler Tape and Data Restoration

Tape and Data Restoration 

Or more precisely the restoration of data that resides on backed up or archived media. There are two fundamental approaches to restore any level of data from backed up media. We call them “native” & “non-native.”

Native means that when a piece of media is to be explored the approach would be to replicate the environment on which the data was originally backed up. This means the operating system, backup software and general software and hardware configuration; this is “native” restoration.

Another approach is to effectively trick the media into thinking it is being restored by a native replication of the backup environment where it is not; this is “non-native” restoration.

LEARN MORE

Data Recovery

When you assemble a group of engineering talent that understand files at the HEX level, understand BITs and BYTES at the magnetic flux transition level, understand recording technology of disk, tape and flash, understand computer operations that take place in the registry, understand backup operational processes in all the major backup software applications of the last thirty years, then you have a team of talented staff capable of recovering corrupt or unreadable data into a meaningful or original form. Whether it be old decaying tapes, environmentally damaged media, dropped hard drives or even corrupted VHD’s (Virtual Hard Drives) in a RAID we have had significant success. If the data is critical and you can no longer read or restore it, give it to us. We will guide you on how to avoid further risk to the media and quickly determine the best course of action.

Restoration as Managed Services

Companies that have data created in legacy systems that no longer create new data need not be paying for them, or struggling to maintain them. Our options remove cost, enable the removal of all infrastructure, and speed up time to data. There’s no downside. Discuss with us the best way to proceed with retiring legacy backup systems. Depending upon the systems and data availability requirements this may be to

  • Have SullivanStrickler take over the environment and bring it into our HAV (High Availability Vault).
  • Virtualize the environment.
  • Extract backup software databases and import metadata into Invenire.
  • Scan backup tapes to extract targeted file level metadata and import to Invenire.

Computer Forensics and Testifying Computer Experts

This is the application of IT to litigation. In particular, computer forensics focuses on evidence found in metadata, deleted files, and system files to build up a timeline of the users actions. Do you suspect the employee that just left took your IP (Intellectual Property), computer forensics is your first step. Do you think they colluded via text messages? Computer Forensics. Do you think computer based evidence was destroyed (spoliated)? Computer forensics again. Did you have important evidence that you inadvertently destroyed? Computer Forensics may get it back for you and avoid a spoliation sanction. Did you get a remedial computer cleaning instruction from the court? Computer forensics again. Do you need a neutral party to fulfill a court ordered computer protocol? Yes, Computer Forensics again.

Our experts have testified in State court, Federal court, Arbitration Hearings, Bankruptcy Court and before the Patent Trial and Appeal Board. They have been engaged in over 1000 matters and testified to numerous causes of action as well as being designated a neutral party to fulfill the duties of dozens of court orders duties.

SullivanStrickler eDiscovery

eDiscovery 

While most of SullivanStrickler’s solution set focuses on the mid to left side of the EDRM (Electronic Discovery Reference Model), namely Information Governance, Identification, Preservation and Collection, we also have the capabilities to take all of that data and run it though the Processing, Review, Analysis and Production portion of the model. Using industry workhorse tools such as Nuix along with in-house developed LEAR, for ECA (Early Case Assessment) that can both feed into Relativity, SullivanStrickler can handle just about all of your eDiscovery needs across the entire spectrum. Our dedicated Project Managers work hand in hand with your team to come up with the most efficient workflow whether you are dealing with a few Megabytes of information all the way up to multiple Terabytes.