RelativityOne
Photo Gallery
RelativityOne
Additional Info
Company | Relativity |
Website | http://www.relativity.com |
Company size (employees) | 1,000 to 4,999 |
Headquarters Region | North America |
Overview
Relativity makes e-discovery software to help users organize data, discover the truth and act on it. Its SaaS product RelativityOne manages large volumes of data and quickly identifies key issues during litigation and internal investigations. Relativity has more than 350,744 users in approximately 41 countries serving thousands of organizations globally primarily in legal, financial services and government sectors, including the U.S. Department of Justice and 198 of the Am Law 200. Relativity provides unparalleled security, scale, performance and innovation from the market-leading solution. Relativity uses advanced AI technology to analyze billions of data points, gain insight into cyberattack trends, and stop attacks before they happen. Calder7, Relativity’s security team, leads the charge with a skilled crew of engineers, analysts and subject matter experts in the fields of cybersecurity, product security and compliance, who are tasked with protecting customer data.
How we are different
1. Relativity offers automated security processes. To achieve the ideal balance between accuracy and speed, we’ve implemented automated security procedures that maximize the effectiveness of our technology, processes and people. We have systems implemented across our entire security posture to maximize the effectiveness of our technology and people. By automating our processes, we can ingest data, contextualize threats and react before danger materializes.
2. Relativity provides expert threat prevention and security insights. We use advanced technology to analyze billions of data points, gain insight into cyberattack trends, and stop attacks before they happen. Relativity works hand in hand with our customers and the security community to share actionable intelligence and defend against threat actors. We regularly share insights with customers and frequently work side by side with them to correct critical vulnerabilities in their own environments. We also collaborate with our threat intelligence providers to share indicators of compromise to further enhance detection in the industry at large. We’re part of a large network of cybersecurity professionals, and we regularly share events and indicators of compromise, output of analyses, and regular educational offerings. In return, we receive invaluable insight into threats in the wild and have the chance to help increase security around the globe. Additionally, in tandem with HackerOne, the team runs its Bug Bounty Program. This program incentivizes external third parties to find security vulnerabilities in a company’s software and report them directly to the company.
3. We have independently achieved ISO 27001:2013, SOC-2 Type II, and HIPAA compliance for our Information Security Management System (ISMS) program. We ensure data security and privacy through our aggressive standards.