Complete Turnkey Investigative Solutions Complete Turnkey ...

Report 3 Downloads 254 Views
Complete  Turnkey  Investigative  Solutions AccessData Professional  Services Fraud,  eDiscovery,  data  leakage  or  just  run-­of-­the-­mill  employee   misconduct  investigations  can  seem  easy  enough  at  the  beginning.   However,  these  investigations  can  quickly  blow  up  both  in  complexity   and  scope.  When  this  happens  you  need  a  partner  you  can  trust.   So  as  a  world-­leading,  digital  investigation  solution  provider,  we  built  a   team  of  experts  to  provide  you  with  cutting-­edge  professional   services.  Our  experts  can  handle  any  type  of  investigation  from  the   largest  eDiscovery  matter  to  an  employee  misconduct  investigation   involving  a  single  computer.  And  because  we  focus  on  hiring  highly   experienced  professionals  with  extensive  government  and  law   enforcement  backgrounds,  we’re  able  to  carry  your  case  from  collec-­ tion  all  the  way  to  review  and  expert  witness  testimony.

INTERNAL  AND  CRIMINAL   FORENSIC  INVESTIGATIONS

SECURITY  INCIDENTS  AND   INFORMATION  ASSURANCE

Forensic  Investigations:  Data   acquisition,  preservation,  analysis   and  detailed  reporting  on  virtually  any   device  and  data  type  including   servers,  desktops,  and  handheld   devices.

Incident  Response  Investigations:   From  identification  to  root  cause   analysis  to  remediation.  Our  state-­of-­ the-­art  incident  response  technology   allows  us  to  quickly  and  effectively   diagnose  security  incidents  and  clean   your  network  after  an  intrusion.

Email  Forensics:  Our  FTK  ®)  technol-­ ogy  is  recognized  as  the  leading   forensic  solution  for  email  analysis,   able  to  automatically  break  out  email   and  attachments  with  support  for  18   email  formats.  

Decryption/Password  Cracking:   We  support  more  than  100  software   applications,  encrypted  containers,   and  operating  systems  for  recovering   lost,  forgotten  or  unavailable  pass-­ words  and  can  offer  large-­scale   distributed  cracking  capabilities  when   necessary.

Malware  Detection  and   Remediation:  Basic  malware   detection  is  easily  handled  by  anti-­ virus  tools,  but  advanced  threats,   such  as  APTs,  rootkits  and  custom   malware  are  a  different  story.     AccessData  can  address  these   issues  in  both  a  proactive  and   reactive  manner  to  prevent  wide-­ spread  damage  and  reduce  the   chances  of  future  incidents. Data  Spillage  Clean-­up:  Access-­ Data  can  diagnose  and  resolve  even   the  most  severe  data  leakage   incidents  in  a  quick,  secure  and  cost   effective  manner.

EDISCOVERY Data  Collection:  We  offer  full   forensic  collection  of  unstructured,   semi-­structured  and  structured  data.   Our  court-­validated  technology   enables  time-­  and  trial-­proven   methodologies.  All  data  collection   activities  are  meticulously  docu-­ mented,  and  evidence  is  handled  and   reviewed  in  accordance  with  law   enforcement  methodologies  and  the   new  amendments  to  the  federal  rules   of  civil  procedure. Data  Production  and  Processing:   All  data  collected  is  culled,  indexed   and  can  be  processed  into  usable   formats,  including  native  format,  tiffs,   pdfs  and  load  files. Data  Hosting  and  Review:  All   processed  data  can  be  made  avail-­ able  for  review  using  any  of  the   popular  third-­party  review  platforms   or  can  be  hosted  and  made  available   through  our  own  secure  hosting  and   review  capabilities.

IP  Theft  Investigations:  Our  digital   investigation  experts  have  extensive   experience  tracking  down  and   building  cases  against  criminals.   Using  our  technology,  we  will  deter-­ mine  what  was  taken,  who  took  it,   and  where  they  took  it. A  Pioneer  in  Digital  Investigations  Since  1987

©2010  AccessData  Group.  All  Rights  Reserved.