top of page
White Structure

About Us

K2’s eDiscovery consultants and project managers are hand-picked, experienced, and highly qualified litigation technology veterans.  The team is made up of former IBM consultants, IT business owners, Am Law 100 firm litigation support professionals and technology paralegals.  Our specialists are trained and certified in forensic examinations, SQL database administration, electronic data handling and review software training.


With over 90 years combined experience, K2’s team of eDiscovery consultants has a deep understanding of the complexity of the litigation process as it relates to the discovery of electronic evidence.  This depth of knowledge arms our team with the agility, flexibility and dexterity to help clients gracefully navigate the oftentimes treacherous waters of eDiscovery. 

Certifications & Security

  • Cellebrite Certified Operator (CCO)

  • Cellebrite Certified Physical Analyst (CCPA)

  • MCSE (Microsoft Certified Systems Engineer)

  • Apple Certified System Administrator (ACSA)

  • Microsoft Certified Solutions Associate (MCSA Office 365)

  • Cisco Certified Network Associate (CCNA)

  • Juniper Network Certified Associate (JNCIA-Junos)

  • Encase Certified Examiner (EnCE)

  • Shoretel IP System (ST-3200)

  • VMware Certified Professional – Data Center Virtualization (VCP5-DCV)

Information Governance with K2 Preparedness

With the exponential growth in the volume of electronic documents that companies create and store, the discussion around information governance has risen. Businesses are spending millions of dollars in unnecessary storage and management costs, while also exposing themselves to security, privacy, compliance and legal risks. K2 consultants work closely with companies and individuals to thoroughly examine current systems and advise on best practices for defensible reorganization.

Identification of People, Systems and Data

K2's team of electronic discovery consultants specialize in developing custom workflows to facilitate the identification and documentation of potential data stores. Our experts have experience from law firms, in-house corporate counsels and Fortune 500 companies.

Preservation Against Alteration or Destruction

K2 can assist your team with the creation of an ESI retention policy, crafting a legal hold policy, interviewing custodians, mapping, identifying and indexing source data (live and archived) to securely and defensibly preserve potentially responsive ESI. Ensuring proper steps are taken during the preservation phase of a project will help to prevent sanctions down the road.

Digital Forensic Collections and Analysis

Dependent upon the specific case requirements, K2 can forensically collect, analyze and report on electronically-stored evidence. K2 has the ability to gather ESI from a number of sources - both live and archived - such as networks, servers, personal computers, backup tapes, removable digital devices, mobile phones, hosted data repositories, email and cloud-based email and social networking sites.

Data Processing and Early Case Assessment

Data processing and early case assessment are two of the most important components of the eDiscovery lifecycle. The validity of a document production is often entirely dependent upon the reliability of the text and metadata extraction in data processing. Taking time for an early case assessment before fully processing electronic documents can save greatly on processing and review costs down the road.

Document Review and Hosted Services 

For many cases, the review phase dominates the hours logged by lawyers and support staff. K2 project managers have a wealth of experience with document review and can advise on best practices for expediting the process. Our hosted and partnered software platforms are objectively the best in the industry.

 The K2 Difference

bottom of page