Cellebrite Acquires BlackBag Technologies
"This acquisition will allow Cellebrite to accelerate the delivery of new Digital Intelligence solutions and services that will empower our customers and allow them to maximize the efficiency and accuracy…
Estonia and the United States to Build a Joint Cyber Threat Intelligence Platform
“The goal is to develop an automized cyber threat intelligence system between the US and Estonian defense forces, tailored to the specific needs of the two nations to enhance the…
FTC and DOJ Announce Draft Vertical Merger Guidelines for Public Comment
According to Assistant Attorney General Makan Delrahim of the Department of Justice’s Antitrust Division, “The revised draft guidelines are based on new economic understandings and the agencies’ experience over the…
Beautifully Dormant? eDiscovery Business Confidence Survey Results – Winter 2020
This is the seventeenth quarterly eDiscovery Business Confidence Survey conducted by ComplexDiscovery. More than 1,900 individual responses have been received from legal, business, and technology professionals across the eDiscovery ecosystem…
Kroll Expands in APAC with Acquisition of RP Digital Security
The deal strengthens Kroll’s cyber risk capabilities across the APAC region, aligning with and further reinforcing the company’s commitment to providing clients with end-to-end cyber resiliency solutions, from detection and…
KLDiscovery Acquires Superior Document Services
"We are delighted to welcome the Superior team into the KLDiscovery family," said Christopher Weiler, CEO of KLDiscovery. "Superior is a well-respected, full-service eDiscovery and litigation support provider in Virginia…
Legility Acquires Inventus
The combined company will deliver a broader range of technology-enabled legal services for the growing global legal operations market and will go forward under the Legility brand. Barry Dark will…
Considering Second Requests? The Requirement, Task, and Prevalence
While leveraging many of the technologies, techniques, and tactics used in traditional eDiscovery activities supporting audits, investigations, and litigation, Second Request discovery is different in the fact that it typically…
Conscious Unclouding? A Hard Look at Data Security and the Cloud
The security of data is fast becoming one of the most prominent and visible areas of concern in the selection of eDiscovery software solutions. With public examples of data security…
eDiscovery Mergers, Acquisitions, and Investments in 2019
Since beginning to track the number of publicly highlighted merger, acquisition, and investment (M&A+I) events in the eDiscovery ecosystem, ComplexDiscovery has noted at least 410 M&A+I events between November 2001…