Twitter Linked In
 

What's On
Cellebrite
Cellebrite Certified Operator (CCO) Training
Location: Sydney
Starting 10th February 2020
Duration: 2 days

Cellebrite
Cellebrite Certified Physical Analyst (CCPA) Training
Location: Sydney
Starting 12th February 2020
Duration: 3 Days

Cellebrite
Video Evidence Recovery and Analysis Course (VERA) Training
Location: Melbourne
Starting 9th March 2020
Duration: 5 Days

Cellebrite
Cellebrite Certified Operator (CCO) Training
Location: Melbourne
Starting 16th March 2020
Duration: 2 Days

Cellebrite
Cellebrite Certified Physical Analyst (CCPA) Training
Location: Melbourne
Starting 18th March 2020
Duration: 3 Days

Cellebrite
Cellebrite Certified Operator (CCO) Training
Location: Wellington, New Zealand
Starting 4th May 2020
Duration: 2 Days


Popular Products
AccessData
Forensic Toolkit (FTK)
Vound Software
Intella Desktop
OpenText - EnCase
EnCase Forensic
CRU DataPort
Wiebe TECH USB Write-Blocker
Vound Software
Intella 250
OpenText - EnCase
EnCase Forensic Imager
Network Security
Sort by Supplier

AD Enterprise: Support incident response (IR) activities, enforce policies and conduct investigations spanning computer misuse and employee misconduct while reducing overhead.

AD Enterprise supports the requirements of law enforcement, private sector and forensic practitioners everywhere with a battle tested solution. Built on our proven digital forensics processing engine, Forensic Toolkit (FTK®), AD Enterprise is the solution of choice for more than 2000 global clients.  Enforce compliance and remediate damage by scanning thousands of endpoints for unapproved processes, and where applicable, kill specific processes and initiate batch remediation on either a single machine or multiple endpoints at across an organization’s entire infrastructure.

An intuitive incident response console, secure batch remediation, unsurpassed searching and filtering, and comprehensive logging and reporting are just a few of the reasons AD Enterprise is the investigative tool of choice for data breach and IT security investigators around the globe.     
The ability to forensically analyze multiple computers across your enterprise simultaneously is critical when performing root cause analysis and internal investigations. Furthermore, proactive use of this technology allows you to detect threats that have circumvented the typical signature-based tools, such as antivirus, intrusion detection and other alerting systems.

The depth, breadth and ease-of-use of the forensic/investigative features of AD Enterprise enables IT security staff and investigators to harness the power of a database powered analysis engine for more efficient, effective and sound investigations. The external consulting costs, state and federal regulatory risks and disruptions to day to day operations associated with the traditional methods of forensic-level investigations, e-discovery and incident response can handicap corporations of any size without the proper solutions and training.

X-Ways Capture is a specialized computer forensics tool for the evidence collection phase of a forensic investigation which captures Windows and Linux live systems. It gathers all data from the running computer e.g. on an external USB hard disk, such that during the analysis even encrypted or otherwise protected data can be examined that was unlocked at the point of time when the system was acquired. 

EnCase Cybersecurity is a unique solution designed to expose and mitigate internal and external risks and threats which evade traditional information security solutions. Understand at the deepest levels what is occurring on your endpoints and ensure 100% visibility into unstructured and volatile data across the enterprise. The powerful cyberforensic capabilities of EnCase Cybersecurity are designed to bring accurate and rapid closure to any incident.

EnCase Endpoint Investigator is a powerful and easy to use remote investigation solution.

Thoroughly search, collect, preserve, and analyze data from laptops, servers, workstations, and virtually any other endpoint in your organization, even when they are not connected to the network, - without disrupting your day-to-day operations.


The Enterprise Immune System is a self-learning cyber AI technology that detects novel attacks and insider threats at an early stage.

Modeled on the human immune system, the Enterprise Immune System learns and understands ‘self’ for everyone and everything in the business, and can spot the subtle signals of an advanced attack — without relying on rules, signatures, or prior assumptions.

Darktrace’s artificial intelligence is world-renowned for its ability to uncover never-seen-before cyber-attacks within an organization and neutralize them in real time.

Forensic Toolkit® (FTK®): Recognized around the World as the Standard Digital Forensic Investigation Solution.

FTK is a court-cited digital investigations platform built for speed, stability and ease of use. It provides comprehensive processing and indexing up front, so filtering and searching is faster than with any other product. This means you can “zero-in” on the relevant evidence quickly, dramatically increasing your analysis speed. Furthermore, because of its architecture, FTK can be setup for distributed processing and incorporate web-based case management and collaborative analysis.

Internet Password Breaker instantly reveals Internet passwords, recovers login and password information which protects various Web resources and mailboxes in different e-mail clients.

Detect. Investigate. Prevent.
Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain intelligence and risk scoring with industry-leading passive DNS data from Farsight Security and other top-tier providers. An intuitive web interface and API atop these data sources help security teams quickly and efficiently investigate potential cybercrime and cyberespionage.

P2 Commander utilises Paraben's advanced plug-in architecture to create specialised engines that focus on such things as E-mail, Network E-mail, Chat Logs, File Sorting, Internet file analysis and more all while increasing the amount of data that can be processed and utilizing resources through multi-threading and task scheduling. P2 Commander runs effectively with lower hardware requirements than you thought possible.

SoftBlock is a kernel-based forensic write-blocking tool that quickly identifies devices upon connection, and depending on user preference, mounts them in either a forensically sound read-only manner or a conventional read-write configuration. This product is designed for both large scale forensic lab environments as well as for individual investigators where the need is to preview and analyse one or more evidentiary devices. 

Replace or recover Windows account passwords and forgotten administrator passwords. Need instant access to a locked account? Forgot rarely-used Administrator password? Gain access to that account instantly by simply booting from Elcomsoft System Recovery Boot CD or assign administrative privileges to any user account! EFS encryption? Require original account passwords? Perform a quick attack or retrieve password hashes for off-line analysis!

Elcomsoft Wireless Security Auditor allows network administrators to verify how secure a company’s wireless network is by executing an audit of accessible wireless networks. Featuring patent-pending cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor attempts to recover the original WPA/WPA2-PSK text passwords in order to test how secure your wireless environment is.

 
Contact us
Australia:+61 (0)2 8012 9810
Singapore:+65 9297 1289
Customer Service:
Technical Support:
Training Bookings:
 
Register For the Fulcrum Newsletter HERE

© Fulcrum Management 2012
Name
Email
Organisation
Phone
Verification Code:
Name
Email
Organisation
Phone
Verification Code: