1 - 10 of 16 results

Magnet IEF

(Options: Software)

Internet Evidence Finder (IEF) is the market leading forensic software used for the recovery of Internet-related data from computer hard drives and live memory. IEF recovers over 200 different artifact types including social networking communications, instant messenger chats, web browser history, webmail, cloud files, P2P file sharing apps, and pictures and videos.

Designed for forensic examiners and trained investigators in law enforcement & government, as well as IT security personnel in corporations who are conducting full forensic examinations.

  • Available in Desktop or USB dongle option.
  • Primarily used in a forensic lab environment.
  • Run against common image formats (i.e. E01, dd images).
  • Search live and deleted artifacts on drive and RAM.

 

Features:

  • Powerful Search Capabilities: Search 220+ Internet artifacts and recover more data from more locations.
  • Find Evidence Quickly: Get immediate search results so you can start working with the data right away.
  • Standardized Reporting: Flexible reporting and categorization to narrow down evidence quickly.
  • Trusted By Industry Leaders: Used by leading law enforcement, government, and businesses around the globe.
  • Adheres to Industry Standards: Maintain the integrity of the case and chain of custody.
  • Simple to Use: Get to key evidence with only 3 clicks of the mouse.

 

Selection: Magnet IEF

Product no. Options Price
PROD00300001-0001 Software
PROD00300001-0002 Maintenance - First year
PROD00300001-0003 Maintenance - 2 years
PROD00300001-0004 Maintenance - 3 years
Browse these categories as well: Software, Magnet

Vound Intella Team

Intella® TEAM enables multiple individuals (reviewers, investigators, paralegals, etc.) to review evidence independently and simultaneously. Intella® TEAM is the ideal email investigation and eDiscovery software tool for an agency, law firm, or investigative team that needs to coordinate the search and analysis of Electronically Stored Information (ESI) and files in excess of 250 gigabytes.
 

 

Intella® TEAM was designed for companies, law enforcement, and professional services firms, and features the powerful indexing search engine and unique visual presentation that has made Intella® popular. Investigators can quickly and easily search, review, and analyze email and electronically stored information. The easy to use interface and Cluster Map allows you to find critical data, visualize relevant relationships, and drill down to the most pertinent evidence.

 

With Intella® TEAM you can index and search multiple email sources, file types, and metadata. View results in a visual layout of your choice and export the documents of interest in a wide variety of file formats. Intella® TEAM includes the most advanced export and sharing features available in the Intella® suite of products. Analysts and reviewers work can be consolidated into a single result facilitating collaborative investigations.

 

Intella® TEAM has two components

 

  • Intella® TEAM Manager is the primary component and performs three critical functions:
    • Indexing & preparation of the case data or evidence
    • Sharing the case data between team members
    • Combining, reviewing, and approving the work of team members
  • Intella® TEAM Reviewers provide the ability for team members to:
    • Independently search, filter, bookmark, tag, and comment on the case data
    • Transfer their work back to the TEAM Manager for review and approval
    • Intella® TEAM consists of 1 TEAM Manager and 3 TEAM Reviewers

Features

  • Ease of use – just point and click
  • Simple to learn and train
  • Reporting options
  • Multi-viewer capability
  • Intelligent software
  • Affordable
  • Upgrades available. Simply contact your consultant or Vound direct
  • 24/7 support
  • Shaped by customer input

Vídeos

 

We also recommend



Vound Intella Pro

The ideal email investigation and eDiscovery software tool for single users that need to search and analyze amounts of Electronically Stored Information (ESI) beyond 250 gigabytes.

Intella® PRO does not have a software limit and was designed for corporate investigators, professional services firms, and consultants. Intella® PRO features the powerful indexing search engine and unique visual presentation that has made Intella® popular.

Investigators can quickly and easily search, review, and analyze email and electronically stored information. The easy to use interface and Cluster Map allows analysts to find critical data, visualize relevant relationships, and drill down to the most pertinent evidence.

With Intella® PRO you can index and search multiple email sources, file types, and metadata. View results in a visual layout of your choice and export the documents of interest in a wide variety of file formats.

 

Features

  • Ease of use – just point and click
  • Simple to learn and train
  • Reporting options
  • Multi-viewer capability
  • Intelligent software
  • Affordable
  • Upgrades available. Simply contact your consultant or Vound direct
  • 24/7 support
  • Shaped by customer input

We also recommend



Vound Intella 250

Intella® 10, 100 & 250 offer the same features. The only difference that defines each one is the amount of Electronically Stored Information (ESI) you can search and analyze. For example, Intella® 250 allows you to search up to 250GB, Intella® 100 up to 100GB and Intella® 10 up to 10GB. These products are the ideal email investigation and eDiscovery software for single users.

They are the ideal email investigation and eDiscovery software tool for single users that need to search and analyze larger amounts of Electronically Stored Information (ESI) up to 250 gigabytes.

Intella® 250 was designed for investigators and consultants and features the powerful indexing search engine and unique visual presentation that has made Intella® popular. Investigators can quickly and easily search, review, and analyze email and electronically stored information.
 

The easy to use interface and Cluster Map allows analysts to find critical data, visualize relevant relationships, and drill down to the most pertinent evidence. With Intella® 250 you can index and search multiple email sources, file types, and metadata. View results in a visual layout of your choice and export the documents of interest in a wide variety of file formats.

 

 

Key Features

  • Ease of use – just point and click
  • Simple to learn and train
  • Reporting options
  • Multi-viewer capability
  • Intelligent software
  • Affordable
  • Upgrades available. Simply contact your consultant or
    Vound direct
  • 24/7 support
  • Shaped by customer input

 

 

We also recommend



Vound Intella Viewer

An optional companion for Intella® 100, 250 and Pro. It performs the same functions of Intella® 100, 250 and Pro except for indexing, thus enabling another investigator to view the case on a different computer. (Limit of 2 Viewers per license of Intella® 100, Limit of 3 Viewers per Intella® 250 and 8 Viewers with Intella® Pro).

 

Key Features

  • Ease of use – just point and click
  • Simple to learn and train
  • Reporting options
  • Multi-viewer capability
  • Intelligent software
  • Affordable
  • Upgrades available. Simply contact your consultant or Vound direct
  • 24/7 support
  • Shaped by customer input

 

We also recommend



Blue Bear LACE Software

Blue Bear LACE Software is a powerful framework of automated tools to effectively process the enormous load of still image and video media evidence files linked to child exploitation cases. Provides tools to help in the identification of victims, suspects, witnesses, crime scenes and related cases.

A secure means for cross jurisdiction collaboration between police services worldwide. Includes automated image appearance matching, automated face detection and extraction, face identification, lightning fast evidence media categorization, integrated reporting and case writing, and interfaces to existing computer forensic tools.

LACE ( Law enforcement Against Child Exploitation) technology is a decisive tool in the global fight against Child Exploitation. Its objective is to design and develop software that gives law enforcement and justice communities the solutions they need to do their jobs effectively, efficiently and successfully.

 

 

 

LACE offers police services

  • a dramatic reduction in the number of media-evidence files (images and videos) that require manual review
  • a reduction in investigator stress levels
  • a reduction in case analysis time, by up to a factor of ten or more
  • a reduction in case trial preparation and summary time
  • Integration with forensic softwares like Xways ; Encase and FTK
  • a mean to identify abused children and suspects using advanced facial identification; and
  • a mean to collaborate and share information with other linked ICE units worldwide
  • a mean to decompose videos in storyboards and match any type of videos with any other format
  • a mean to export standard hash and visual signatures for CETS, PhotoDNA, C4P-C4All, and several country specific national databases

 

Features

 

 

LACE Uses a police oriented workflow and polished graphical user interface to reduce investigator workload by processing more cases in less time and with significantly reduced stress.

 

 

  • Multiple workstations can concurrently access LACE for work on different cases - allows each investigator to work on their own case at their own desk simultaneously
  • Carves Image and Video files from E01,S01, RAW, or DD files from Encase, Xways and FTK - fully compatible with existing forensic tools
  • Extracts image and video files directly from physical drives - carves from allocated and unallocated space
  • Extracts images and videos from a Window's folder or Drive (logical carve: DVD, USB, CD etc..)
  • Scans ISO/BIN/CUE/ZIP/RAR archives and copy protected DVDs
  • Automatically segregates password protected archives
  • Scans all types of thumbs.db and thumbscache
  • Scans Shadow Copy backups - also automatically de-duplicates Shadow Copy files
  • Carves images and videos from embedded files - includes any document type and Emails
  • Compatible with C4P/C4All for both of the import of the Index.xml and export of completed cases
  • Compatible with CETS for export and reporting including exporting PhotoDNA signatures
  • Directly import results from the Netherlands Forensic Institute "SIEVE" package
  • Search the accumulated database directly by Hash, EXIF, Image, and Face
  • Add multiple exhibits to a case: - A case can include any number of exhibits (evidence sources; HD's, USB devices, CD/DVD's) and these exhibits can be reviewed and reported individually or as a single complete case.
  • Automatically de-duplicates and matches images - tolerates rotations, cropping, watermarking, changes in resolution or format, colour vs. BW vs. Sepia, damaged files, and minor alterations like obscured eyes-faces: not fooled by "hash change" programs
  • Employs a unique Zero False Positive visual matching technology - places uncertain matches in the Unknown category for manual review
  • Automatically categorizes media files matched from previously processed cases - the accumulated database typically allows 80% to 90+% of case files to be automatically categorized
  • Filters out irrelevant/junk files - the gifs, icons, borders, and edges that accumulate in temp directories
  • Identifies new unknown and relevant media-evidence files for manual review - Efficiently categorize the new files and automatically add them to the accumulated database
  • Includes a "Skin Filter" to aid in quickly identifying possible illegal images
  • Includes a "Similar Image Finder" that will identify images having a similar background, including similar persons, or taken in a similar environment.
  • Includes "Image Sub-Search" which enables searches for specific objects and colours that may be present in other images
  • Full EXIF Data Reporting/Filtering - Allows analysis and filtering of gallery and reports by manufacturer specific EXIF data including device Serial Numbers.
  • Automatically detects and extracts faces from case media-evidence files
  • Uses automated facial identification to detect facial images of a victims and suspects from previously processed cases
  • Securely share case results (categorized hash sets and visual signatures) in any format with other agencies.
  • Includes Standard hash exports for CETS, PhotoDNA, C4P/C4All, and several country specific national databases.
  • Export hash sets/bookmarks back into Encase, FTK, and other forensic packages.

 

Advanced Technology for Increasingly Complex Crimes

  • Supports MySQL, MS-SQL, PostGres, IBMdb2, and Oracle databases - not tied to any specific database
  • Creates databases of victims, suspects, witnesses, and crime scene locations - easily create victim "series" from image files or extracted faces
  • Helps identify victims, and suspects - immediately know if your current case involves a known victim
  • Enables direct collaboration and securely shares information across linked police jurisdictions, worldwide - Simple tools for exporting and importing hash sets, visual signatures, and databases in almost any format.

 

 

Advanced Evidence Processing

 

LACE applies the following processes to new cases:

  • Automatic pre-categorization of innocuous (irrelevant) media evidence files using BlueBear ??s Automated Innocuous Categorization System (AICS),
  • Automated de-duplication of case media-evidence files using digital hash checksum
  • Automated de-duplication of case media-evidence files using advanced image matching,
  • Automated categorization of case media-evidence files against database(s) of pre-categorized media-evidence files using digital hash checksum and advanced image matching,
  • Automated multi-view face detection & face extraction from case media-evidence files,
  • Facial identification of victims, suspects, & witnesses across cases.

 

 

Multi-view Face Detection and Extraction

 

LACE ?? technology automatically detects and extracts faces from case files. Extracted faces are stored in a database and matched to similar faces both within the current case and to other cases. An investigator can quickly scroll through, edit, and select faces for further investigation or to include in case reports. LACE also includes a unique single face search capability allows an investigator to search the accumulated face database using any image file.

 

 

 

Court Acceptable Reports

 

LACE generates reports for prosecutors that refer back to computer forensic information which links media- evidence files previously categorized as child exploitation to the offender's seized computer media. Safeguards ensure reliability of the forensic integrity process. The LACE Reports Wizard permits investigators to effortlessly and quickly select images and case related metadata to efficiently create court acceptable case and individual image reports. Reports can be generates in many formats including; PDF, DOC, ODF, HTML, CSV, and Text

 

 

We also recommend



EnCase Cybersecurity

When integrated with the alerting or event management solution of your choice, the power of EnCase Cybersecurity shines - the moment an alert or event is generated, real-time response automatically captures critical endpoint information before it has a chance to decay or disappear altogether - giving you the information you need to quickly and accurately determine what actually happened.

 

 

The EnCase Cybersecurity Advantage:


From the initial investigation through triage to remediation, EnCase Cybersecurity fully addresses endpoint incident response and is the preferred solution for government agencies and leading financial, retail and entertainment organizations.
Integrates with any security event management or alerting system to enable automated, real-time response, allowing you to capture critical endpoint data the moment an alert is generated, even if it happens at 2 a.m.
Built upon gold-standard EnCase Forensic technology, EnCase Cybersecurity exposes both unknown threats, artifacts related to an incident and sensitive data residing on endpoints, no matter how well hidden.

Backed by our incident response expert services that provide industry best practices, integration services, training and the industry recognized EnCE® certification.

 

 

Introduction video

 

We also recommend



EnCase eDiscovery

This comprehensive and scalable solution for managing electronic evidence for litigation or investigative matters significantly reduces the risk and cost of e-discovery. From initiating legal hold and preservation to early case assessment (ECA), document review and production, EnCase eDiscovery Complete combines the power of EnCase eDiscovery with the flexibility of CaseCentral cloud review to establish the ideal e-discovery environment for corporate legal departments.

Trusted by more than 60% of the Fortune 100, EnCase eDiscovery Complete provides real time visibility and management oversight of the end-to-end e-discovery process, establishing a more efficient workflow and significantly reducing your legal risk and cost with a unified, scalable, defensible, and repeatable solution.

 

Features

 

Legal Hold
• Create and manage Legal Holds from a single interface
• Automatically identify and notify custodians regarding legal preservation holds using Active Directory (AD)
• Ensure preservation obligations are met in full
• Provide visibility and insight for the preservation and collection of ESI via enhance custodian questionnaires

 

Anytime Analytics and Early Case Assessment (ECA)
• Unique ability to do pre- and post-case assessment and first-pass review at any point in the e-discovery process
• Easy culling and tagging of document groups prior to review
• Powerful data analytics and a simple interface
• Documents are accessible directly from the application

 

Non-disruptive Collection and Preservation
• Exclusive capability to collect and preserve content with no disruption to business operations
• Powerful collection and patented, optimized, distributed search functionality deliver the most
comprehensive results possible

Processing
• View pivotal information in a graphical layout
• Superior culling and processing

 

The Right Architecture for the Right E-Discovery Function
• On-Premises collection and preservation behind the firewall, providing security and oversight of your electronic data
• Secure hosted review and production safely enables collaboration among a geographically dispersed legal team
with disparate infrastructure
• Blended on-premise or hosted processing and analysis offers flexibility to suit your needs and your way of operating

We also recommend



EnCase Forensic

(Year: + EDS)

EnCase® Forensic, the industry-standard computer investigation solution, is for forensic practitioners who need to conduct efficient, forensically sound data collection and investigations using a repeatable and defensible process. The proven, powerful, and trusted EnCase® Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.

 

Features

 

Acquire from Almost Anywhere: Acquire data from disk or RAM, documents, images, e-mail, webmail, Internet artifacts, Web history and cache, HTML page reconstruction, chat sessions, compressed files, backup files, encrypted files, RAIDs, workstations, servers, and with Version 7: smartphones and tablets.

 

Forensically Sound Acquisition: EnCase® Forensic produces an exact binary duplicate of the original drive or media, then verifies it by generating MD5 hash values for related image files and assigning CRC values to the data. These checks and balances reveal when evidence has been tampered with or altered, helping to keep all digital evidence forensically sound for use in court proceedings or internal investigations.

 

Advanced Analysis: Recover files and partitions, detect deleted files by parsing event logs, file signature analysis, and hash analysis, even within compounded files or unallocated disk space.

 

Improved Productivity: Examiners can preview results while data is being acquired. Once the image files are created, examiners can search and analyze multiple drives or media simultaneously.

 

Automated de-NISTing Capabilities: The National Software Reference Library (NSRL) is provided in the EnCase hash library format, allowing user to easily de-NIST their evidence, eliminating thousands of known files from their evidence set. This reduces the time and amount of data that needs to be analyzed significantly.

 

Multiple File Viewer Support: View hundreds of file formats in native form, built-in Registry viewer, integrated photo viewer, see results on a timeline/calendar.

 

Customizable and Extensible with EnScript®: EnCase® Forensic features EnScript® programming capabilities. EnScript®, an object-oriented programming language similar to Java or C++, allows users create to custom programs to help them automate time-consuming investigative tasks, such as searching and analyzing specific document types or other labor-intensive processes and procedures. This power can be harnessed by any level of investigator the “Case Developer” or one of the numerous built-in filters.

 

Automatic Reports: Export reports with lists of all files and folders along with detailed list of URLs, with dates and time of visits. Provide hard drive information and details related to the acquisition, drive geometry, folder structure, etc.

 

Actionable Data: Once investigators have identified relevant evidence, they can create a comprehensive report for presentation in court, to management or stakeholders in the outcome of the investigation.
Integration to Passware Kit Forensic: Use the Evidence Processor to automate the detection of encrypted files. Once the files are decrypted by Passware Kit Forensic* they can be easily integrated back into EnCase Forensic for further analysis.
 

 

Introduction video

Selection: EnCase Forensic

Product no. Year Price
PROD00280027-0002 18% per year for 2 years
PROD00280027-0003 16% per year for 3 years
PROD00280027-0004 + EDS

We also recommend



SpectorSoft Spector 360

(Delivery: Download Only, License: 25)


Spector 360 is SpectorSoft’s flagship solution for monitoring your employees company-wide -- whether they are in the office, traveling or working remotely -- even when they are not connected to the company network.

Spector 360 records your employees’ web sites visited, emails sent and received, chats and instant messages, keystrokes typed, files transferred, documents printed and applications run. In addition, through a first of its kind surveillance-like camera recording tool, Spector 360 shows you in exact visual detail what an employee does every step of the way.

Spector 360 takes the recorded Internet and computer activities from each of your employees, feeds that information into a database and provides you with more than 50 built-in reports and unlimited customization to answer questions like:

  • Which employees are spending the most time surfing web sites?
  • Who is spending time on shopping sites, sports sites or adult sites?
  • Which employees chat or use anonymous email services like Hotmail and Gmail?
  • Who is sending the most emails with attachments?
  • Which employees may be leaking company confidential information via removable media like flash drives, CDs and DVDs?
  • Which employees are printing sensitive documents?
  • Who is arriving to work late and leaving early? Who takes long lunch breaks?
  • What are my employees searching for on Google, Yahoo and MSN?

Beyond reporting, Spector 360 retains the user-level investigative tools our customers have grown to rely on. If you detect a problem or suspect a specific employee is the main culprit of abuse, you can dig deeper and review every detail of the computer and Internet activity to gather the evidence you need. The level of detail is so precise that you can see what an employee does each and every second.

With high-level reports and charts that help you quickly identify those employees who are most likely engaging in activities that are harmful to your company, you’ll be able to focus any detailed investigations on those specific individuals, and be assured that Spector 360 will provide you with all the details you need to conduct the most thorough analysis possible.

In addition, Spector 360 allows you to proactively control how your employees use the web by integrating Internet Filtering with world-class monitoring. Block access to specific web sites or to categories deemed inappropriate for your workplace. Restrict access by individual, group, department or the entire company. With more than thirty pre-defined web filtering categories, Spector 360 gives you the power to eliminate excessive and explicit Internet surfing while keeping your employees focused and on task.

Our customers use SpectorSoft products primarily to uncover Internet abuse, lost productivity, leaking of confidential information and other inappropriate activities by their employees that expose them to financial, legal and other preventable risks. As a simple example, finding just one employee who spends an hour a day surfing non-work-related web sites and reducing that to just a few minutes a day can save a company more than 200 hours a year in lost productivity. Multiply that by 10 employees and you gain back 2000 hours in one year.

SpectorSoft Internet monitoring solutions have become so popular with employers that more than 50,000 companies use SpectorSoft solutions to crackdown on Internet abuse within their organization, and SpectorSoft has been selected for four years by Inc. Magazine as one of the Fastest Growing Private Companies in America.

Spector 360 enables you to Monitor your employees' PC and Internet usage, Analyze trends and patterns, Search for specific details, Investigate when something seems amiss, and Report your findings all from the convenience of your desktop. All of these functions can be performed across the following events and activities:

With Spector 360, you can quickly observe how one or more employees are using company resources with easy-to-read intuitive charts. Analyze the usage patterns and trends of individuals, groups, departments, divisions, or your entire company. You can customize these charts to suit your specific needs, enabling you to monitor your organization both efficiently and effectively. Identify problem areas without having to perform long and tedious manual searches. If anything seems to be amiss from analyzing the “Big Picture View”, you can drill-down to reveal the nitty-gritty details. Several powerful and easy-to-use tools are provided allowing you to sift through your recorded data to locate a specific event or pattern. You can even replay the screen snapshots associated with any event using Spector 360’s Screen Snapshot Viewer and its easy-to-use VCR-like controls. Generate professional, customizable management reports of your findings with just a few clicks of a mouse.

Spector 360 empowers you to address your productivity, ethics, security, and compliance concerns head on, by monitoring computer and Internet usage across your entire organization day and night, 365 days a year.
 

More Information


Visit the Spectorsoft's website:

Selection: Spectorsoft Spector 360

Product no. Delivery License Price
PROD00050203-0004 Download Only 25
PROD00050203-0005 Download Only 50 4,049.00 € *
PROD00050203-0017 Download + CD 25 2,249.00 € *
PROD00050203-0030 Download Only Other Number of Licenses - Please Call
* Prices without VAT or delivery

We also recommend



1 - 10 of 16 results