|
 |  | |
| The Detego® Unified Forensics Platform is a true end-to-end investigation suite for the acquisition, analysis and reporting of any digital assets.
| |
 |
|
|  | |
|
SPF Pro (SmartPhone Forensic System Professional) is a
forensically sound system for extracting, recovering, analyzing and triage data
from mobile devices such as Android phones, tablets, iPhone & iPad. It is
the next generation of SalvationDATA mobile forensics tool and is a powerful
and integrated platform for digital investigations. It allows investigators to
examine and ascertain relevant information from mobile devices easily and
efficiently both in the field and in the lab, and helps them to recover and
collect critical forensic evidence from huge backlogs of even locked
smartphones using multi-tasking and intelligent analysis functions, and extract
more evidentiary data in less time than ever before. As an all-in-one and
user-friendly system, SPF Pro can automatically choose the best solution for
extracting file system, physical, and logical evidentiary data from several
mobile OS like Android, iOS, Symbian, Blackberry, etc. especially from 99% of
Chinese brand mobile devices and feature phones. The extracted data includes
deleted data, communications, contacts, messages, media files, clouds data, and
Apps, etc. | |
 |
|
 |  | |
| Efficiently and seamlessly conduct enterprise-wide search, targeted collection, systemized preservation, litigation hold, processing, data assessment and complete legal review – all while keeping costs in line and reducing risk.
| |
 |
|
 |  | |
| AD Enterprise: Support incident response (IR) activities, enforce policies and conduct investigations spanning computer misuse and employee misconduct while reducing overhead.AD Enterprise supports the requirements of law enforcement, private sector and forensic practitioners everywhere with a battle tested solution. Built on our proven digital forensics processing engine, Forensic Toolkit (FTK®), AD Enterprise is the solution of choice for more than 2000 global clients. Enforce compliance and remediate damage by scanning thousands of endpoints for unapproved processes, and where applicable, kill specific processes and initiate batch remediation on either a single machine or multiple endpoints at across an organization’s entire infrastructure. An intuitive incident response console, secure batch remediation, unsurpassed searching and filtering, and comprehensive logging and reporting are just a few of the reasons AD Enterprise is the investigative tool of choice for data breach and IT security investigators around the globe. The ability to forensically analyze multiple computers across your enterprise simultaneously is critical when performing root cause analysis and internal investigations. Furthermore, proactive use of this technology allows you to detect threats that have circumvented the typical signature-based tools, such as antivirus, intrusion detection and other alerting systems. The depth, breadth and ease-of-use of the forensic/investigative features of AD Enterprise enables IT security staff and investigators to harness the power of a database powered analysis engine for more efficient, effective and sound investigations. The external consulting costs, state and federal regulatory risks and disruptions to day to day operations associated with the traditional methods of forensic-level investigations, e-discovery and incident response can handicap corporations of any size without the proper solutions and training.
| |
 |
|
 |  | |
| AD Lab: Reducing case backlogs through distributed processing and collaborative analysis.AccessData Lab is a centralized investigative platform that enables division of labor, collaborative analysis, centralized case management and web-based review, thereby dramatically streamlining the investigative process. Furthermore, AD Lab enables distributed processing, allowing investigators to utilize additional hardware to dramatically increase their case processing and resolution speed.
| |
 |
|
 |  | |
| With a need of the integration of different forensic tools in single console, Axxera Engineers have developed a custom solution for this problem.
Axxera 4N6 manages all Digital Forensic tools in one centralized portal designed specifically for the public and private sectors as well as law enforcement agencies. Axxera 4N6 is able to be deployed all over the world and can integrate with virtually every available forensic tool in today’s market. | |
 |
|
 |  | |
| The Black Hole Data Bag VECTOR Kit is designed to shield wireless devices from RF signals while being examined or charged. The Data Bag is an innovative solution that replaces the need for a hard-sided faraday enclosure. With the new VECTOR addition, capacitive touch screen devices can be operated directly with a finger or with the provided stylus. Touch screen device usage no longer requires extra components like foam pieces or cradles! | |
 |
|
 |  | |
| BlackLightâ„¢ represents the next generation in computer forensics. It was specifically designed to analyse iOS (iPhone and iPad), Mac OS X and Classic (OS 9) data, ensuring the highest levels of accuracy. BlackLightâ„¢ offers users an intuitive platform for carving, searching, analyzing and reporting Mac and iOS data within one application.
| |
 |
|
 |  | |
| X-Ways Capture is a specialized computer forensics tool for the evidence collection phase of a forensic investigation which captures Windows and Linux live systems.
It gathers all data from the running computer e.g. on an external USB hard disk, such that during the analysis even encrypted or otherwise protected data can be examined that was unlocked at the point of time when the system was acquired. | |
 |
|
 |  | |
| As an examiner, you need a specialized tool to perform a thorough analysis of chat logs. Paraben's Chat Examiner is another specialized component of Paraben's P2 Forensic Collection that adds one more powerful program to your toolkit. Whether your case has ICQ, Yahoo, MSN, Trillian, Skype, Hello, or Miranda you'll be able to handle whatever comes your way. Please note that AOL Instant Messenger (AIM) does not have traditional data stores or logs and therefore will not be supported by Chat Examiner. | |
 |
|
|  | |
|
Data Copy King 2 (DCK 2) is the second generation of
SalvationDATA’s well received forensic data eraser and disk duplicator.
Equipped with multi-function write-blockers, and embedded high capacity storage
drive, DCK 2 is a fully portable device designed for both filed and laboratory
applications. With embedded read-only SATA/USB and multi-function card reader
interfaces, DCK 2 provides one-stop solution to most common storage devices.
DoD standard data erasure ensures zero possibility to recover any digital data
wiped by DCK 2. DCK 2, a must-have tool in your digital forensic laboratory or
information security department.
| |
 |
|
|  | |
|
DRS (Data Recovery System) is the next generation
intelligent all-in-one forensic data recovery tool which can help you acquire
and recover data from both good and damaged storage media like HDD simply and
easily. Having integrated with main functions as disk diagnostics, disk
imaging, file recovery, file carving, firmware recovery, reporting, write
protection and hash calculation, more functional features as fragment recovery,
RAIDx automatic reallocation, break-point recovery, USB3.0 support have been
included in DRS as well. Especially for the workflow of digital forensics,
without external write blocker, read-only port has been embedded in DRS to
ensure that data has not been tampered. Besides, DRS can generate and output
detailed reports so that the investigation process can be clearly documented.
DRS Preview is the software version which grants you access to almost all
fascinating features of DRS including multi-tasking, except firmware recovery,
advanced imaging, and features related physical status of HDD.
| |
 |
|
 |  | |
| Davory undeletes files and recovers files from logically corrupted or formatted drives. Incorporates some of the data recovery techniques from WinHex and concentrates on ease of use. | |
 |
|
|  | |
|
SalvationDATA is widely known as the famous data recovery
and digital forensics solution provider among the world. In 2013, SalvationDATA
has established its wholly owned subsidiary Sichuan Masterpiece Technology LLC
which is a leading manufacturer for computer forensics laboratory equipment.
With the ambition to provide intelligent software with fantastic hardware,
SalvationDATA focuses on providing reliable and unique digital forensics
laboratory solution in furniture design, proprietary work space, acoustics and
electricity control, as well as security. All the equipment are compatible with
SalvationDATA software as DRS, VIP, SPF etc.
| |
 |
|
 |  | |
| E3:Universal has broken the boundaries of digital evidence with its ability to process any type of digital data. E3:U truly masters the three sides of the digital triangle with file system/hard drive data, smartphone/mobile data, and the new emerging IoT data. For any lab or organization, the ability to have one unified interface and control over process is key for efficiency and consistency. | |
 |
|
|  | |
| EnCase Endpoint Investigator is a powerful and easy to use remote investigation solution.
Thoroughly search, collect, preserve, and analyze data from laptops, servers, workstations, and virtually any other endpoint in your organization, even when they are not connected to the network, - without disrupting your day-to-day operations.
| |
 |
|
 |  | |
| From the simplest requirements to the most complex. EnCase Forensic gives investigators the ability to image a drive and preserve it in a forensic manner using the EnCase evidence file format (LEF or E01), a digital evidence container vetted by courts worldwide. | |
 |
|
 |  | |
| All-in-one forensic solution for locating, extracting, and analyzing digital evidence stored inside computers and mobile devices and mobile devices, RAM and cloud. Belkasoft Evidence Center is designed with forensic experts and investigators in mind: it automatically performs multiple tasks without requiring your presence, allowing you to speed up the investigation; at the same time, the product has convenient interface, making it a powerful, yet easy-to-use tool for data extraction, search, and analysis.
| |
 |
|
 |  | |
| Evidor is software for lawyers, law firms, corporate law and IT security departments, licensed investigators, and law enforcement agencies.
Evidor allows you to search text on hard disks and retrieves the context of keyword occurrences on computer media, not only by examining all files (the entire allocated space, even Windows swap/paging and hibernate files), but also currently unallocated space and so-called slack space. That means it will even find data from files that have been deleted, if physically still existing. Evidor is a small subset of just the search functionality in X-Ways Forensics. Please note that Evidor cannot access remote networked hard disks. For a more powerful solution please use X-Ways Investigator.
| |
 |
|
 |  | |
| Forensic Toolkit® (FTK®): Recognized around the World as the Standard Digital Forensic Investigation Solution.FTK is a court-cited digital investigations platform built for speed, stability and ease of use. It provides comprehensive processing and indexing up front, so filtering and searching is faster than with any other product. This means you can “zero-in” on the relevant evidence quickly, dramatically increasing your analysis speed. Furthermore, because of its architecture, FTK can be setup for distributed processing and incorporate web-based case management and collaborative analysis. | |
 |
|
 |  | |
| Unmatched Acquisition Flexibility – Including PCIe Support!Digital forensic investigators and examiners need the ability to quickly image many different types of suspect drives in their lab through a reliable, forensically-sound product. The Forensic Universal Bridge is the latest integrated write-blocker from Tableau that supports the following types of storage media:
| |
 |
|
 |  | |
| X-Ways Forensics is an advanced work environment for computer forensic examiners and our flagship product. It runs under Windows 2000/XP/2003/Vista*/2008*/7*. Compared to its competitors, X-Ways Forensics is more efficient to use after a while, often runs faster, is not as resource-hungry, finds deleted files and search hits that the competitors will miss, offer many features that the others lack, ..., and it comes at a fraction of the cost! It is based on the WinHex hex and disk editor and part of an efficient workflow model where computer forensic examiners share data and collaborate with investigators that use X-Ways Investigator. | |
 |
|
 |  | |
| FRED is Digital Inteligence's Forensic Recovery of Evidence Device. The FRED family of forensic workstations are highly integrated, flexible and modular forensic platforms and now include Digital Intelligence's exclusive UltraBay II Write Protected Imaging Bay and Ventilated Imaging Shelf. | |
 |
|
|  | |
| High-impact storytelling of criminal activities with GeoTime Desktop for Law Enforcement. Create easy, customizable reports and videos to tell the entire criminal story in court. | |
 |
|
 |  | |
| Internet Evidence Finder (IEF) is a digital forensics solution that can search a hard drive, live RAM captures, or files for Internet-related evidence. IEF was designed with digital forensics examiners/ investigators in mind. IEF is also used by IT security professionals, litigation support personnel, incident response teams, cyber security specialists and corporate investigators. IEF can recover evidence left behind within social networking artifacts, instant messaging chat histories, popular webmail applications, web browsing history, and peer-to-peer file sharing applications. IEF is Magnets original product which is the prequel to Magnet AXIOM which is a more powerful feature rich tool. | |
 |
|
 |  | |
| X-Ways Investigator is a powerful investigation/document analysis/report generation application for law enforcement, intelligence agencies, and the private sector. It runs under Windows. It was designed for investigators who are specialized in areas such as accounting, building laws, money laundering, corruption, homicide, child pornography, etc. | |
 |
|
 |  | |
| Forensic in-line USB and Flash Media WriteBlocker- Easy, write-blocked access to a variety of flash media: SD Cards, CompactFlash, Memory Sticks, and USB thumb drives
- Entirely bus-powered -- no need to carry around a separate AC brick
- Highly portable, with compact lightweight design
- Optional read/write mode
- LEDs for indicating power, mode, and access
- Lifetime toll free tech support and 2-year warranty
| |
 |
|
 |  | |
| It enables the mounting of EnCase; AccessData FTK;
Unix/Linux;
Forensic File Format;
SMART;
ISO; and
VMWare
image files as a drive letter under the Windows file system. | |
 |
|
|  | |
| Through a significant investment in research and development, we have authored a completely new ground-breaking product, engineered through innovation and fresh thinking. NetAnalysis® v2 is a state-of-the-art application for the extraction, analysis and presentation of forensic evidence relating to Internet browser and user activity on computer systems and mobile devices. Our NetAnalysis® suite also includes HstEx® v4, and advanced data recovery solution designed to recover deleted browser artefacts which can be imported into, and analysed in NetAnalysis®.
NetAnalysis® v2 is a software product that offers significant improvements over existing applications and methodologies.
| |
 |
|
 |  | |
| Quickly Process Large Volumes of Digital EvidenceNuix Investigator Lab is for organizations looking to set up a dedicated facility that can rapidly ingest and process terabytes of digital evidence per day and make it available for timely analysis. Our investigation software enables multiple investigators and subject matter experts simultaneously to review and collaborate on an investigation with secure remote access, and produce comprehensive reports on your findings. It includes portable and network collection functionality, a separate Nuix Investigator Workstation license for a laptop or desktop PC and up to two days installation and configuration. The base product comes with five reviewer licenses; additional reviewers and Nuix Web Review & Analytics are also available.
| |
 |
|
 |  | |
| Investigate Large Cases and Complex Data Sources with Speed and PrecisionDigital investigations frequently involve large numbers of devices including multiple computers, mobile devices and a variety of digital storage media, as well as difficult-to-access corporate data formats and storage systems. Nuix’s advanced digital forensics software is engineered to triage, process, analyze and bring to the surface critical evidence bridging entire data sets, regardless of the geographical location, repository, file type or size. In addition, Nuix's electronic evidence software can automatically identify key intelligence items such as email addresses and phone, social security and credit card numbers.
| |
 |
|
 |  | |
| Collaborate Online for Faster ResultsThis powerful web analytics software delivers fast, collaborative eDiscovery review and true early case assessment from any web browser. It provides secure and compartmentalized access to case data for multiple reviewers, lawyers, subject matter experts and external parties—and it rapidly scales to tens or hundreds of reviewers per case, with no complex databases or tricky client plugins to install. Nuix Web Review & Analytics makes it easy to provide secure and compartmentalized access to case data for multiple reviewers, investigators, subject matter experts and external parties. It offers seamless integration with Nuix eDiscovery and Nuix Director.
| |
 |
|
 |  | |
| P2 Commander utilises Paraben's advanced plug-in architecture to create specialised engines that focus on such things as E-mail, Network E-mail, Chat Logs, File Sorting, Internet file analysis and more all while increasing the amount of data that can be processed and utilizing resources through multi-threading and task scheduling. P2 Commander runs effectively with lower hardware requirements than you thought possible. | |
 |
|
|  | |
| Quin-C speeds data access, processing and analysis, and offers a highly customizable UI for more accurate, advanced investigations in less time. It’s simple, visual and powerful, with flexible out-of-the-box configurations to fit the unique needs and challenges of any digital investigation. | |
 |
|
 |  | |
| Recover My Files data recovery software will recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure. | |
 |
|
 |  | |
| Recover deleted digital photographs, video, or music. Recover corrupt camera storage media. Regain access to those valuable memories. Simple and easy to use. Download now and view your lost photos. | |
 |
|
|  | |
| Road Warrior is an entire forensic lab inside a rolling case. Powerful Portable Forensic Evidence Seizure, Preview and Analysis System. Validated Speeds of 27GB/min. The Road Warrior is a forensic portable Lab designed as a High-Speed Forensic Data Acquisition and Analysis Workstation. The Road Warrior is designed within a Ruggedized case built for the road and equipped with all the necessary tools to Forensically seize data from drives supporting today's most common drive interfaces. With a built-in Tri-Screen and high end processor, the Road Warrior offers the Forensic Investigator a powerful and versatile platform for Forensic Data Seizure and Analysis. | |
 |
|
 |  | |
| The SATA LIF Adapter is used to adapt a SATA connection to a 1.8" SATA/LIF hard drive. | |
 |
|
 |  | |
| SoftBlock is a kernel-based forensic write-blocking tool that quickly identifies devices upon connection, and depending on user preference, mounts them in either a forensically sound read-only manner or a conventional read-write configuration. This product is designed for both large scale forensic lab environments as well as for individual investigators where the need is to preview and analyse one or more evidentiary devices. | |
 |
|
 |  | |
| Setting the Bar for Legal Review Software since 1988Staying true to its innovative roots, today’s Summation is the first and only web-based solution that combines native and image ingestion, data processing, early case assessment, case organizer, transcript management and final review in a single platform— entirely eliminating the need for iterative processing, data loading and repetitive review cycles. Offered as a stand-alone, appliance or as a component of AD eDiscovery, Summation covers the post data collection stages of the e-discovery process as well as transcript and case management functionality. All this plus a tool that still addresses the needs of desktop review and heritage Summation users.
| |
 |
|
 |  | |
| The First Portable PCIe Forensic Write Blocker The T7u is the first portable write-blocker that enables forensic acquisition of PCIe SSDs, and is the second Tableau PCIe product offering. With the T7u you will be equipped to handle the vast array of new laptops and tablet computers that are making use of these high performance PCIe hard drives.
| |
 |
|
 |  | |
| X-Ways Trace is a computer forensics tool that allows to track and examine web browsing activity and deletion of files through the Windows recycle bin that took place on a certain computer. | |
 |
|
 |  | |
| OpenText™ Tableau Forensic Imager (TX1) is a highly-intuitive imaging solution that solves the difficult challenges surrounding forensic data acquisition. It offers superior local and networked forensic imaging capabilities with no compromises, even when conducting simultaneous forensic jobs. TX1 delivers consistent results, giving investigators peace of mind when dealing with various types of digital evidence. | |
 |
|
|  | |
|
VIP (Video Investigation Portable) is a forensically sound
system for video extraction, recovery and analysis from CCTV DVRs of video
surveillance system during investigations. Through VIP, it helps clarify the
visual evidence and restore the truth rapidly.
VIP can get access to the CCTV DVRs without password. And
there are four main features of VIP i.e video extraction, video play, video
retrieval and analyze. With these features, VIP could help you quickly extract
video clips from video surveillance system; automatically retrieve video
evidence from abundant video clips; successfully get access to encrypted or
destroyed CCTV DVRs. | |
 |
|
 |  | |
| MD5’s proprietary forensic software tool, Virtual Forensic Computing (VFC®) is an essential tool in an investigator’s tool box. VFC saves time and energy by helping the examiner to quickly and effortlessly recreate the digital crime-scene, allowing the investigator to hunt around and interact with the suspect’s desktop environment.
| |
 |
|
 |  | |
| WinHex is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security. An advanced tool for everyday and emergency use: inspect and edit all kinds of files, recover deleted files or lost data from hard drives with corrupt file systems or from digital camera cards. | |
 |
|
 |  | |
| The CRU WriteBlocking Validation Utility provides an easy-to-use method to determine if a hardware writeblocker blocks low-level hard drive commands.
| |
 |
|
 |  | |
| A Bay-Mount Write-Blocker With Unmatched Performance & Interface SupportThe WriteProtect™-BAY write-blocker provides secure, read-only, write-blocked access to SAS, SATA, USB3.0, FireWire™, IDE (IDE supported with an adapter) and PCIe M.2 suspect hard drives. Extremely fast performance is powered by a Superspeed USB 3.0 host connection to easily manage large capacity hard drives. The WriteProtect-BAY provides support for 6 different storage technologies in a 5.25”, half-height design that fits into the drive bay of your forensic workstation. Logicube, a pioneer in the digital forensic industry, delivers an easy to use, reliable and professional forensic write-blocking solution. | |
 |
|
 |  | |
| The Only Portable Write-Blocker That Supports 5 Hard Drive Interfaces In One DeviceThe WriteProtect™-DESKTOP write-blocker provides secure, read-only, write-blocked access to SAS, SATA, USB3.0, FireWire™, and IDE (IDE supported with an adapter) as well as PCIe M.2 suspect hard drives. Extremely fast performance is powered by a Superspeed USB 3.0 host connection to easily manage large capacity hard drives. The WriteProtect-DESKTOP is the only portable write-blocker on the market that provides support for 6 different storage technologies in one compact device. Logicube, a pioneer in the digital forensic industry, delivers an easy to use, reliable and professional forensic write-blocking solution. | |
 |
|
 |  | |
| The ZX-Tower (also known as ZX-T), wipe solution provides secure sanitization of hard disk drives. The ZX-T delivers blazing fast wiping at 24GB/min. The multi-target ZX-T allows organizations to easily wipe up to 8 target hard drives simultaneously and also allows user to wipe up to 4 USB 3.0 enclosures. A simple to use icon-based interface and a 5¡È color touch screen makes it easy to operate for all skill levels. The unit features a secure erase mode, a custom pass wipe setting and a powerful DoD specification 7-pass wipe mode.
| |
 |