|Company size (employees)
|1,000 to 4,999
|Type of solution
Relativity makes e-discovery software to help users organize data, discover the truth and act on it. Its SaaS product RelativityOne manages large volumes of data and quickly identifies key issues during litigation and internal investigations. Relativity has more than 300,000 users in approximately 40 countries serving thousands of organizations globally primarily in legal, financial services and government sectors, including the U.S. Department of Justice and 198 of the Am Law 200. Relativity provides unparalleled security, scale, performance, and innovation from the market-leading solution. Relativity uses advanced technology to analyze billions of data points, gain insight into cyberattack trends, and stop attacks before they happen. Our security team, Calder7, leads the charge with a skilled crew of engineers, analysts, and subject matter experts tasked with protecting our customer’s data.
How we are different
• Relativity offers automated security processes. To achieve the ideal balance between accuracy and speed, we’ve implemented automated security procedures that maximize the effectiveness of our technology, processes, and people. We have systems implemented across our entire security posture to maximize the effectiveness of our technology and people. By automating our processes, we can ingest data, contextualize threats, and react before danger materializes.
• Relativity provides expert threat prevention and security insights. We use advanced technology to analyze billions of data points, gain insight into cyberattack trends, and stop attacks before they happen. Our security team, Calder7, leads the charge with a skilled crew of engineers, analysts, and subject matter experts tasked with protecting our customer’s data. Relativity works hand in hand with our customers and the security community to share actionable intelligence and defend against threat actors. We regularly share insights with customers and frequently work side by side with them to correct critical vulnerabilities in their own environments. We also collaborate with our threat intelligence providers to share indicators of compromise to further enhance detection in the industry at large. We’re part of a whole network of cybersecurity professionals, and we regularly share events and indicators of compromise, output of analyses, and regular educational offerings. In return, we receive invaluable insight into threats in the wild and have the chance to help increase security around the globe.
• We have independently achieved ISO 27001:2013, SOC-2 Type II, and HIPAA compliance for our Information Security Management System (ISMS) program. We ensure data security and privacy through our aggressive standards.