AD Enterprise: Support incident response (IR) activities, enforce policies and conduct investigations spanning computer misuse and employee misconduct while reducing overhead.
AD Enterprise supports the requirements of law enforcement, private sector and forensic practitioners everywhere with a battle tested solution. Built on our proven digital forensics processing engine, Forensic Toolkit (FTK®), AD Enterprise is the solution of choice for more than 2000 global clients. Enforce compliance and remediate damage by scanning thousands of endpoints for unapproved processes, and where applicable, kill specific processes and initiate batch remediation on either a single machine or multiple endpoints at across an organization’s entire infrastructure.
An intuitive incident response console, secure batch remediation, unsurpassed searching and filtering, and comprehensive logging and reporting are just a few of the reasons AD Enterprise is the investigative tool of choice for data breach and IT security investigators around the globe.
The ability to forensically analyze multiple computers across your enterprise simultaneously is critical when performing root cause analysis and internal investigations. Furthermore, proactive use of this technology allows you to detect threats that have circumvented the typical signature-based tools, such as antivirus, intrusion detection and other alerting systems.
The depth, breadth and ease-of-use of the forensic/investigative features of AD Enterprise enables IT security staff and investigators to harness the power of a database powered analysis engine for more efficient, effective and sound investigations. The external consulting costs, state and federal regulatory risks and disruptions to day to day operations associated with the traditional methods of forensic-level investigations, e-discovery and incident response can handicap corporations of any size without the proper solutions and training.
Proactive security requires intelligence - using intelligence to reveal not only where the adversary is today, but where they have been and their objectives tomorrow. The Falcon Intelligence portal allows security teams to easily consume actionable security intelligence and automated indicator feeds
The Consultant Edition of F-Response was built and designed around the needs of larger and geographically distant consulting teams. Using F-Response Consultant Edition you will be able to access multiple computer phyiscal devices with a single Consultant Edition software key. In addition, that key will remain physically connected to your workstation/laptop and not connected to the remote target device.
The Consultant + Covert Edition of F-Response is the traditionally non-covert (GUI) version of F-Response + a 2nd "Covert" console designed to allow direct deployment to a single covert target.
F-Response Enterprise is a Windows Service based version of F-Response uniquely designed for Managed Services consultants and internal corporate investigations. F-Response Enterprise edition was designed from the ground up for ease of deployment and management utilising the Enterprise Management Console.
The F-Response Field Kit Edition is a value priced single user version of the F-Response patent pending software suite. An F-Response Field Kit, when physically connected to the remote computer, will give you access to all the physical drives on that remote computer via the network. Best of all the Field Kit is licensed for one year and priced at less than one typical hour of consulting time!
F-Response Tactical is the newest F-Response software product. Tactical has been uniquely designed to streamline live analysis, collection, and authentication. Tactical is built around the best of the F-Response Field Kit and Consultant edition, it was designed from the bottom up to be easier to use, faster, smaller, and more efficient.
EnCaseÂ® Cybersecurity is a unique solution designed to expose and mitigate internal and external risks and threats which evade traditional information security solutions. Understand at the deepest levels what is occurring on your endpoints and ensure 100% visibility into unstructured and volatile data across the enterprise. The powerful cyberforensic capabilities of EnCase Cybersecurity are designed to bring accurate and rapid closure to any incident.
A powerful and easy to use remote investigation solution.
Thoroughly search, collect, preserve, and analyze data from laptops, servers, workstations, and virtually any other endpoint in your organization, even when they are not connected to the network, - without disrupting your day-to-day operations.
Investigate Large Cases and Complex Data Sources with Speed and Precision
Digital investigations frequently involve large numbers of devices including multiple computers, mobile devices and a variety of digital storage media, as well as difficult-to-access corporate data formats and storage systems.
Nuix’s advanced digital forensics software is engineered to triage, process, analyze and bring to the surface critical evidence bridging entire data sets, regardless of the geographical location, repository, file type or size. In addition, Nuix's electronic evidence software can automatically identify key intelligence items such as email addresses and phone, social security and credit card numbers.
|Oxygen Forensic® Detective - all-in-one mobile forensic solution for data extraction from mobile devices which includes advanced and significantly improved modules for data analysis: Oxygen Forensic® Cloud Extractor, Oxygen Forensic® Call Data Expert and Oxygen Forensic® Maps. |
The TD3 Forenisc Imager is a mix of proven and new technology that is squarely focused on the core forensic market.
TD3 supports forensic imaging of SATA, IDE, USB 3.0, SAS, and FireWire (1394 A/B) storage devices and iSCSI network shares. It has a high resolution, colour touch-screen user interface and it's 1 Gig Ethernet connection supports imaging to network shares as well as remote access for investigations and triage.