AD Enterprise provides deep visibility into data to investigate employee wrongdoing and to facilitate regulatory and legal requirements so you can respond quickly, remotely and covertly while maintaining chain of custody. Facilitating focused forensic investigation and post-breach analysis, without interruption to business operations.
Divide and conquer with AD Lab. This proven tool helps power through massive data sets, handle various data types and run multiple cases at the same time, all within a collaborative, scalable environment. AD Lab uniquely enables distributed processing, allowing investigators to utilize additional hardware to dramatically increase their case processing and resolution speed.
AD Triage is an easy-to-use data acquisition and extraction tool for forensically sound on-scene collection. Whether you are in law enforcement dealing with the growing backlog of devices waiting to be processed or a company managing the rising costs of e-discovery, AD Triage allows users to collect data from computers, whether they are turned on or turned off.
A single, fully integrated platform for forensically sound preservation/litigation hold, search, collection, processing, data assessment and complete legal review. AD eDiscovery gives teams a repeatable, defensible process for managing e-discovery that will hold up in court.
A case management solution that lets you manage, track and report on all aspects of your digital forensics investigation from evidence collection to court. Easily Organise Digital Forensic Investigations. Empower your digital forensics lab to manage cases, generate real-time reports and track digital investigations from end-to-end to ensure that the chain-of-custody was maintained.
Quickly analyze computer (Mac & Windows) volumes and mobile devices to shed light on user actions. With easy searching, filtering and sifting through large data sets, it’s simply the best option available for smart, comprehensive analysis.
With the ever-growing variety of digital devices and cloud sources, investigators need solutions to analyze digital evidence. Cellebrite Pathfinder automates the analysis of digital data to resolve investigations faster.
Unlock cloud-based evidence to solve the case sooner. Extract, preserve and analyse public and private-domain, social-media data, instant messaging, file storage, web pages and other cloud-based content.
Cerberus is an automated malware triage platform solution designed to easily integrate with FTK®, empowering organizations to proactively identify compromised systems. It’s a first layer of defense against the risk of imaging unknown devices and allows you to identify infected files and avoid exporting them after processing your data.
F-Response Collect is the newest server-based product provided by F-Response designed to create universal/raw images of remote windows devices from virtually anywhere. F-Response Collect provides fully scriptable and automated image collection of remote Windows assets with a focus on robust operation, rapid collection, and fully resumable imaging.
This hands-on 5-day course will teach you how to access the Dark Web safely and anonymously, navigate within the many layers of the Dark Web to discover hidden Wiki’s and dig through Dark Web search engines.
Digital Evidence Investigator (DEI) has been designed to meet both forensic lab and field triage requirements. DEI is used by both forensic examiners and investigators who have training to run and configure the tool.
Faraday Tents enable maximum, comprehensive security for forensic and anti-espionage investigations. The Faraday Tent secures more than just devices, it secures an entire area so that investigators may operate in a protected field.
Secure multiple devices at once with a Utility Bag that offers the size and strength to isolate many signals simultaneously. This faraday duffel bag offers the same great protection of every other compact EDEC bag, but with an unprecedented amount of space for every device in question.
EDEC Utility Faraday Bag Non Window. Cell phones, tablets, laptops and wireless devices are safe from unwanted intrusion by cellular, WiFi, Bluetooth, and radio signals with the ISOTech shielding system of the Window Utility Bag. Every bag effectively isolates a device from any outside network so it cannot be hacked, tracked, or detected.
EDEC Utility Faraday Bags with Window. Cell phones, tablets, laptops and wireless devices are safe from unwanted intrusion by cellular, WiFi, Bluetooth, and radio signals with the ISOTech shielding system of the Window Utility Bag. Every bag effectively isolates a device from any outside network so it cannot be hacked, tracked, or detected.
OpenText EnCase Endpoint Security equipped with real-time monitoring and detection of persistent threats, for uninterrupted visibility into endpoints and advanced threats with the potential to survive a system reboot.
The FREDC Forensic Data Center is the core of a high-performance Forensic Network. Visit our Forensic Networks solutions page to learn how Forensic Networks help corporations, law enforcement and law firms to manage their forensic and eDiscovery workloads.