News item (October 26, 2016)

Webinar: Customize your case reports
April 14, 2020 Sara Ekberg

Webinar series: Analyze DI Explained

Customize your case reports

Date: May 13th, 2020
Watch replay: Available on the Griffeye portal

In this fourth session of our “Analyze DI Explained” webinar series, we will show you how to make the most of the reporting function, and cut down on admin work.

Analyze DI makes it possible to export your case report in several different formats to fit your needs. In this webinar we will discuss how to create and customize the following report types:

  • Summary report
  • File list report
  • Excel report
  • Comma Separated Value (CSV) report
  • NCMEC Submissions

Speaker: Eric Oldenburg

Eric Oldenburg is Griffeye’s Law Enforcement Liaison in North America. Before coming to work for Griffeye, he was a police officer with the Phoenix Police Department in Arizona for 24 years. 15 years of that working at the Internet Crimes Against Children taskforce (ICAC). Eric has a unique experience from working both as an investigator and a computer forensics examiner.

Find out more about Eric

More Griffeye news

  • Empowering CSA investigators

    In this article, published in Police Professional, Griffeye’s CEO, Johann Hofmann, explains how tech is evolving to fight the growing…

  • Release of Analyze 20.2

    The 20.2 release is mostly about quality improvements, but we also added a new function that we hope will have…

  • Webinar: Victim ID workflows in Analyze DI

    July 8 @ 1 pm UTC (15:00 CEST)

  • Release of Analyze 20.1

    Today, we are thrilled to announce the release of Analyze 20.1, including Griffeye Brain for video.

  • Introducing Analyze DI Online Training

    Today, we’re excited to launch our full-featured Analyze DI online training to further support law enforcement professionals working to…

  • Seeing the bigger picture: A chat with Tristan Oliver, Griffeye Law Enforcement Liaison in the UK

    With 30 years under his belt as a police officer, 16 years of that as a computer forensics…