Your SlideShare is downloading. ×
Cyber exploitation and malicious activity have become increasingly sophisticated and targeted.
Public and private sectors ...
Our Proactive Threat Identification (PTI) program is the most comprehensive digital forensics
solution available. Booz All...
Upcoming SlideShare
Loading in...5
×

Digital Forensics: Digital Evidence That Endures

107

Published on

Booz Allen Hamilton has extensive experience conducting digital forensics investigations for diverse clients in the defense, civil, commercial, and intelligence sectors.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
107
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Digital Forensics: Digital Evidence That Endures"

  1. 1. Cyber exploitation and malicious activity have become increasingly sophisticated and targeted. Public and private sectors face increasing challenges in protecting their intellectual capital and critical enterprise IT assets. Many digital forensics groups have difficulty keeping up with the demands of this industry and responding to the trends in attacks. Booz Allen Can Help with Comprehensive Digital Forensics Solutions At Booz Allen Hamilton, a leading strategy and technology consulting firm, we provide services to leading corporations, government and other public agencies, emerging growth companies, and institutions. We have extensive experience conducting digital forensics investigations of varied sizes and scopes for diverse clients in the defense, civil, commercial, and intelligence sectors. We offer professionals who are highly experienced in digital forensics. We also have more than 1,000 information assurance (IA) professionals, many of whom have high-level government clearances. In addition, we offer training in forensics best practices to improve your organization’s internal forensics capability. Our experts have experience training local, state, federal, and corporate investigators in the latest incident response and forensics analysis techniques. Our Digital Forensics Services and Approach Booz Allen offers major areas of digital forensics expertise, including the following: • Intrusion analysis • Host-based analysis • Malicious code analysis • Incident response and management • Data theft and exposure analysis • Vulnerability, threat, and risk management About Booz Allen Booz Allen Hamilton is a leading provider of management and technology consulting services to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen is headquartered in McLean, Virginia, employs approximately 25,000 people, and had revenue of $5.86 billion for the 12 months ended March 31, 2012 (NYSE: BAH) For more information contact Thomas Chandler Principal chandler_thomas@bah.com 301-821-8968 Mark Eckert Senior Associate eckert_mark@bah.com 210-932-5612 Anthony Harris Senior Associate harris_anthony@bah.com 301-419-5119 www.boozallen.com/cloud S T R A T E G Y & O R G A N I Z A T I O N | T E C H N O L O G Y | E N G I N E E R I N G & O P E R A T I O N S | A N A L Y T I C S Digital Forensics Digital Evidence That Endures
  2. 2. Our Proactive Threat Identification (PTI) program is the most comprehensive digital forensics solution available. Booz Allen has developed the PTI program to go beyond the normal approach to investigations. In addition to standard forensics services, PTI focuses on identifying indicators of compromise. PTI uses our proprietary Automated First Responder (AFR) to identify a range of threats—from internal malfeasants to organized criminals and nation-state adversaries—using highly targeted client-side attacks such as spear-phishing to compromise fully patched systems that have up-to- date antivirus systems. PTI is a proven, successful tool. It is a digital forensics and incident response utility designed to quickly collect specific information from a system, enabling its users to successfully identify malicious code. AFR has proven its effectiveness in situations when anti-virus, host-based intrusion detection systems or rootkit detectors have been unable to detect malicious code. We can tailor custom AFR builds to client networks and use them to push changes to hosts and remediate discovered compromises. See our ideas in action at boozallen.com 04.093.13B

×