Resolver
Over 1,000 organizations worldwide depend on Resolver’s security, risk and compliance software. From healthcare and hospitals to academic institutions, and critical infrastructure organizations including airports, utilities, manufacturers, hospitality, technology, financial services and retail. For security and risk leaders who are looking for a new way to manage incidents and risks, Resolver will help you move from incidents to insights.
Learn more
Polonious
Polonious is an ISO27001 investigation management workflow solution designed around 3 key principles:
1 - Security
2 - Process centric
3 - Configuration and flexibility
What this means is that Polonious allows you to build workflows to manage your investigations in a way that manages your data and your evidence in a highly secure, ISO27001 certified way; allows you to comply with any regulatory requirements with minimal headache and effort by building workflows which are inherently compliant, and; does so without the need for expensive and time consuming code changes - it's even possible for users to do it themselves via the GUI.
With Polonious, you can run detailed reports on case outcomes, timeframes, and finances, and break that down across case types, investigators, and even down to investigation status. So you can prove your value up the chain, but you can also identify any problem areas and improve your efficiency.
Learn more
smiAware
Our comprehensive Deep Report captures an individual's complete digital footprint. With our Export service, we safeguard important evidence before it vanishes. The Research Bundle allows clients to merge the capabilities of the Deep Report with additional research tools. Additionally, we provide tailored services for various needs, including litigation support, class action assistance, deposition screening, as well as expert witness and jury selection. Our thorough investigations delve into intricate networks, social media platforms, and the deep web. Each investigation is specifically customized based on the search criteria provided by the client to uncover targeted information. Furthermore, our Export mechanism ensures reliable web and social media evidence by collecting source code and metadata to maintain a secure digital chain of custody, which offers a dramatically enhanced approach compared to conventional screenshots. This meticulous process not only strengthens the integrity of the evidence but also provides clients with unparalleled assurance in their findings.
Learn more
FTK Forensic Toolkit
Quickly hone in on pertinent evidence, streamline searches, and significantly enhance analysis speed with FTK®, an innovative solution designed to work seamlessly with mobile devices and e-discovery technologies. FTK stands out as a robust and reliable tool that processes and indexes data in advance, thereby removing the downtime typically associated with search execution. Regardless of the variety of data sources or the volume of data needing examination, FTK excels in delivering results more rapidly and effectively than any other option available. By employing distributed processing, FTK is the sole forensic tool that fully utilizes multi-threaded and multi-core computing capabilities. While other forensic applications may underutilize modern hardware, FTK maximizes all available resources to aid investigators in promptly locating critical evidence. With its upfront indexing, the filtering and searching processes are executed with greater efficiency than any other alternative, enabling a more streamlined workflow for investigators. Ultimately, FTK not only enhances speed but also improves the overall effectiveness of forensic investigations.
Learn more