Compare EMC Kazeon SourceOne eDiscovery vs. OpenText eDiscovery

EMC Kazeon SourceOne eDiscovery is ranked 21st in eDiscovery while OpenText eDiscovery is ranked 2nd in eDiscovery with 4 reviews. EMC Kazeon SourceOne eDiscovery is rated 0, while OpenText eDiscovery is rated 7.6. On the other hand, the top reviewer of OpenText eDiscovery writes "It is used as a forensic tool and End point Security that takes an image, extracts the data and then analyzes the keyword search besides providing Security for the Enterprise network". EMC Kazeon SourceOne eDiscovery is most compared with EMC SourceOne Discovery Manager and OpenText eDiscovery, whereas OpenText eDiscovery is most compared with AccessData FTK, Nuix eDiscovery and Tanium.
You must select at least 2 products to compare!
Most Helpful Review
Use EMC Kazeon SourceOne eDiscovery? Share your opinion.
Find out what your peers are saying about Commvault vs. OpenText eDiscovery and other solutions. Updated: January 2020.
396,515 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
We have a license. And, we found the cost high. We contacted them and talked to them about the ratio of the US dollar versus the Indian rupee and then we came to a solution.We have a license. And, we found the cost high. We contacted them and talked to them about the ratio of the US dollar versus the Indian rupee and then we came to a solution.EnCase is an affordable solution.​The product is affordable and user-friendly.​

Read more »

Use our free recommendation engine to learn which eDiscovery solutions are best for your needs.
396,515 professionals have used our research since 2012.
out of 46 in eDiscovery
Average Words per Review
Avg. Rating
out of 46 in eDiscovery
Average Words per Review
Avg. Rating
Top Comparisons
Compared 7% of the time.
Also Known As
Kazeon SourceOne eDiscoveryEnCase
Dell EMC
EMC Kazeon eDiscovery is a quick-to-deploy appliance-based product that automates the in-house identification, collection, preservation, processing, analysis, and review of content that resides in live and archive data sources such as desktops, laptops, Common Internet File System (CIFS) and Network File System (NFS) file shares, Microsoft Exchange, Symantec Enterprise Vault, Microsoft SharePoint, and IBM Lotus Domino, and in corporate archives and content management repositories, such as EMC Documentum. EMC Kazeon eDiscovery in-place capabilities allows organizations to conduct eDiscovery and investigations, rapidly ascertain risk exposure, and meet privacy requirements while only collecting ESI which is relevant and legally obtainable. EMC Kazeon eDiscovery further provides flexibility, speed, and accuracy in transparently collecting relevant ESI in a defensible manner complete with auditing and data verification capabilities. With a simple user interface, legal teams can perform collection in a single step without requiring IT resources.

EnCase Endpoint Security enables earlier detection, faster decisions and unprecedented threat response. Real-time continuous monitoring and newly integrated threat intelligence instantly analyzes and responds to would-be threats. Redefining the user experience with its redesigned user interface that is deliberate and intended to enhance the security users' end-to-end experience. Enriched and contextualized endpoint data, reported as Threat Scores, allow users to quickly focus on suspicious activities without analyzing all telemetry. It Create events, collect endpoint data, initiate scans, remediate, and more from third party security tools using open APIs.

Learn more about EMC Kazeon SourceOne eDiscovery
Learn more about OpenText eDiscovery
Sample Customers
Wentworth Douglass HospitalOntario Ministry of Government, Aerospace Company, Chesterfield Police Department
Top Industries
No Data Available
Software R&D Company25%
Manufacturing Company12%
Security Firm12%
We monitor all eDiscovery reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.