The Consultant Edition of F-Response was built and designed around the needs of larger and geographically distant consulting teams. Using F-Response Consultant Edition you will be able to access multiple computer phyiscal devices with a single Consultant Edition software key. In addition, that key will remain physically connected to your workstation/laptop and not connected to the remote target device.
The Consultant + Covert Edition of F-Response is the traditionally non-covert (GUI) version of F-Response + a 2nd "Covert" console designed to allow direct deployment to a single covert target.
EnCase® Cybersecurity is a unique solution designed to expose and mitigate internal and external risks and threats which evade traditional information security solutions. Understand at the deepest levels what is occurring on your endpoints and ensure 100% visibility into unstructured and volatile data across the enterprise. The powerful cyberforensic capabilities of EnCase Cybersecurity are designed to bring accurate and rapid closure to any incident.
EnCase® Enterprise is a network enabled, covert investigative solution that allows organisations to do a forensically sound investigation across the wire from a single point on a network without having to have physical possession of the system or hard drive in question and without taking it off line, avoiding any business disruption.
AccessData® Enterprise takes network-enabled digital investigations to the next level. Built on our industry-standard, court-validated Forensic Toolkit® technology, AD Enterprise delivers state-of-the-art incident response capabilities, deep dive analysis of both volatile and static data, as well as superior threat detection capabilities – all within an easy-to-use interface. A role-based permission system, an intuitive incident response console, secure batch remediation capabilities, unsurpassed searching and filtering, and comprehensive logging and reporting are just a few of the reasons AD Enterprise is quickly being adopted by Fortune 500 companies.
F-Response Enterprise is a Windows Service based version of F-Response uniquely designed for Managed Services consultants and internal corporate investigations. F-Response Enterprise edition was designed from the ground up for ease of deployment and management utilising the Enterprise Management Console.
The F-Response Field Kit Edition is a value priced single user version of the F-Response patent pending software suite. An F-Response Field Kit, when physically connected to the remote computer, will give you access to all the physical drives on that remote computer via the network. Best of all the Field Kit is licensed for one year and priced at less than one typical hour of consulting time!
OnLineDFS (tm) software enables in-depth analysis of computer systems in order to identify behavior that is at variance with policies, regulations or laws, and to gather data in a forensically sound manner.
Because OnLineDFS enables non-disruptive but forensically-sound examination and information-gathering, as well as data gathering from systems which are geographically remote from the investigator, it is ideal for auditing running systems for compliance assurance and for gathering data for e-discovery.
Remote Forensics is an award winning patent-pending secure architecture upon which full digital forensics, imaging and analysis, can be conducted, without pulling any of the data back across the network.
Our forensic hardware PODs sit in your risk locations just waiting to be summoned into action when things go wrong. This patent-pending technology is designed for a variety of organisations and situations.
SilentRunner® enables you to answer the difficult question of "What happened?" in the aftermath of a security incident by tackling the complicated tasks of capturing, analyzing and visualizing network data. It is a passive network monitoring solution that visualizes network activity by creating a dynamic picture of communication flows, swiftly uncovering break-in attempts, weaknesses, abnormal usage, policy violations and misuse, and anomalies — before, during and after an incident.
SilentRunner™ Sentinel™ lets you know what’s happening on your network by tackling the complicated tasks of capturing, analyzing and visualizing network and VoIP data. It’s a passive network monitoring solution that creates a dynamic picture of communication flows to swiftly uncover break-in attempts, weaknesses, abnormal usage, policy violations and anomalies before, during and after an incident. Operating like a surveillance camera, SilentRunner Sentinel can play back events from thousands of communications to validate system threats and investigate security breaches.
F-Response Tactical is the newest F-Response software product. Tactical has been uniquely designed to streamline live analysis, collection, and authentication. Tactical is built around the best of the F-Response Field Kit and Consultant edition, it was designed from the bottom up to be easier to use, faster, smaller, and more efficient.
The TD3 Forenisc Imager is a mix of proven and new technology that is squarely focused on the core forensic market.
It has a native, write-blocked USB 3.0, SATA, and FireWire connections for forensic data collection. It has a colour touch-screen user interface and it's 1 Gig Ethernet connection supports imaging to network shares as well as remote access for investigations and triage.