SlideShare a Scribd company logo
1 of 4
Download to read offline
Take Control of your Investigations.
The only mobile forensic solution that enables you to
adapt to ever-changing mobile device technology and
address new challenges in real time.
BROCHURE
Mobile Phone Examiner Plus®
(MPE+®
)
www.AccessData.com © 2014 AccessData Group
Key Features
Supports 10,000+ mobile devices (with
Chinese chipset device collection add-
on VELOCITOR).
Physical extraction of Android™
devices,
with password bypass capabilities.
Logical extraction of Android
devices without the need to know the
manufacture or model.
Logical extraction of “burner” Android
devices utilizing dSOLO.
Physical extraction of iOS® devices.
Logical extraction of iOS devices
without the need of iTunes.
30% faster than leading competitors
in logical extraction of iOS and Android
devices utilizing the iLogical and
dLogical data collection capabilities
SQLBuilder allows examiners to
parse the data of all applications
containing a SQLite database. "ZeroDay
applications" can be supported,
allowing examiners to build and save
their own scripts to extract and analyze
application data.
pythonScripter provides users with the
ability to build python scripts to parse
anything from a mobile device with an
easy-to-use interface. Unlike other
solutions, MPE+ pythonScripter acts
upon a copy of the evidence, not the
original binary or evidence file.
Advanced Analytics with Graphical
Data Visualization allows users to get a
timeline view of device communication
that can be customized to the year,
month, day or hour; quickly filtering the
relevant data.
Output all the data or selected data in
several different report formats with
customizable reports.
Advanced Alert Manager gives the
examiner the ability to import or create
predefined words, phrases, numbers,
etc and search the entire data set to
help uncover key evidence in a matter of
minutes. Alerts can be ran per case or
for all collections; helping to triage large
datasets for specific criteria.
MPE+ is the perfect choice for mobile forensics
examiners looking to upgrade their capabilities.
Today, most crimes involve electronic evidence contained on mobile
devices; quickly identifying this evidence is not only critical in resolving
these crimes but also streamlines case processing to help reduce case
backlogs. AccessData’s Mobile Phone Examiner Plus (MPE+) provides you
with the tools necessary to identify, collect and effectively uncover the key
data other solutioottns miss. MPE+ supports even the most challenging
mobile device profiles and offers the broad capabilities of high-priced tools
at a fraction of the cost. Features advanced carving, deleted data recovery,
application data extraction and analysis, SQLite database browsing,
filtering options and more.
Mobile device technology is ever-changing. It's
almost impossible to maintain the quality and
efficiency of mobile forensic tools with such
technology changing cycles so frequently.
Mobile technology is progressing at such
a rapid rate, it’s difficult for mobile forensic
solutions to keep up. Most forensic tools
require regular updates to keep pace with
the volatility of mobile technologies and
are often overwhelmed. Typically, forensic
tools are antiquated technology at the
time of their release since mobile device
application updates are anything but
routine. MPE+ overcomes all the variations of mobile devices—different
hardware, OS versions, updates, etc.—by providing investigators with an
easy-to-use yet comprehensive solution that works on today’s technology
and future variations without the need for constant software upgrades.
The MPE+ pythonScripter allows the examiner to create, import or use
preconfigured python scripts against data imported into the MPE+ solution.
This allows MPE+ to support a near unlimited volume of devices, data types,
application specific data and digital metadata.
>50% of the U.S. population uses smart devices.
>95% use Mobile Device applications daily for
communication purposes, social media, and financial
transactions.
Law enforcement must be able to identify and examine all the apps that
reside on a mobile device, and they must be able to extract the data
associated with those apps. They need a mobile device forensics solution
that’s flexible enough to keep up with the fast-moving landscape of mobile
apps and smart enough to uncover the hidden evidence those apps often
hold. MPE+ is the only mobile forensic tool on the market that allows you
to build simple SQL queries to extract hidden application data from all
applications containing a SQLite database. Because of this capability,
MPE+ can support most applications available—no need to wait for a
software upgrade!
© 2014 AccessData Group www.AccessData.com
Mobile forensic investigators can no longer rely on
“push button” mobile forensics tools that are unable to
uncover ALL data available on mobile devices.
Research shows that only 5 to 10 percent of the entire corpus of user data is examined
by typical mobile device forensics tools. This leaves as much as 95% of application data
uncollected, and therefore unanalyzed. MPE+ not only acquires Android and iOS devices
30% faster than competitor tools but also uncovers more critical user data from these
devices than any other tool on the market. It bypasses select Android and iOS device “locks”
and performs advanced iOS acquisitions even when the iTunes® password is not known.
The rising tide of mobile malware is forcing forensics examiners to understand how to recognize and
analyze it together with other evidence. Furthermore, the increase in the number of apps on the device
increases the likelihood that some may contain malicious code or security holes. MPE+ allows you to
identify, analyze and document these threats without the need of built in signature based tools. With
MPE+, you can mount a collected image and use any custom malware tool, as well as commercial anti-
virus, to scan for threats.
A portable device can contain gigabytes of data. This increases the security
risk for enterprises utilizing BYOD.
MPE+ helps enterprises address BYOD (Bring Your Own Device) risks by allowing them to collect data
from employee’s mobile devices when a threat is identified. It not only allows them to visualize and
analyze contact and communication data, but can also identify elements that may have lead to a security
breach (IP addresses accessed, internet traffic, domains accessed, etc.). MPE+ transforms this big data
into data intelligence to help pinpoint the meaningful information needed for data interpretation and
incident remediation.
WORST CASE SCENARIO: BEST CASE SCENARIO:
If you haven't encountered mobile malware yet, you will soon.
Mobile malware harms the
integrity of evidence presented
in a court of law.
Mobile malware introduces a
delay in the investigation.
First responders lack the
clearance, tools and training to
search a phone. MPE+ is a critical
tool for us to manage our growing
case load.
Detective Tyler Clarke, Lead Investigator,
Reno Police Dept. Forensics Unit
Support 95% of Chinese Devices by adding MPE+ VELOCITOR
In many cases, a mobile device may look like a mainstream smart device, but it is actually a cloned or
counterfeit devices known as Shanzhai phones. In those instances, most mobile forensics solutions fall
short, making it impossible to process critical data. MPE+ VELOCITOR is an MPE+ add-on hardware that
enables the full flash data extraction from these devices, exposing critical evidence quickly without the
need for a third-party tool or software.
A simpler, inexpensive solution
for data collection in the field.
MPE+ nFIELD combines the powerful mobile
device extraction capabilities of MPE+ with a
simple user interface specifically ideal for non
tech users. The wizard-driven interface allows
you to forensically collect from mobile devices
on-scene with practically zero training.
MPE+ nFIELD
LEARN MORE: www.AccessData.com
GLOBAL HEADQUARTERS
+1 801 377 5410
588 West 300 South
Lindon, Utah
USA
NORTH AMERICAN SALES
+1 800 574 5199
Fax: +1 801 765 4370
sales@accessdata.com
INTERNATIONAL SALES
+44 20 7010 7800
internationalsales@accessdata.com
Fast logical extraction of iOS and
Android devices utilizing iLogical and
dLogical data collection capabilities.
Build python scripts with pythonScripter to parse anything from a mobile device
on an easy to use interface. This allows limitless support for any device. Unlike
other solutions on the market, MPE+ pythonScripter acts upon a copy of the
evidence, not the original binary or evidence file. This insures the MPE+ solution
will not change or alter the original files, folders or any associated data.
MPE+
Mobile Phone Examiner Plus
LEARN MORE
Case Study: In processing a
suspect’s iPhone 4 with Cellebrite’s
UFED, Sgt. Sneary utilized MPE+’s
iLogical support for iOS devices to
validate findings by Cellebrite. By
utilizing MPE+’s iLogical support
for iOS devices, Sgt. Sneary was
able to carve 13,000 more images
than what was first extracted when
Cellebrite’s UFED tool was used.

More Related Content

What's hot

Windows10_IoT_business_challenge-Avinash
Windows10_IoT_business_challenge-AvinashWindows10_IoT_business_challenge-Avinash
Windows10_IoT_business_challenge-AvinashAvinash Misra
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisIRJET Journal
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoTMONICA-Project
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsEMMAIntl
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Salim Hosen
 
G data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_usG data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_uslinkedinbeam
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of BiometricsPeachy Essay
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...AIRCC Publishing Corporation
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложенийSECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложенийSECON
 

What's hot (20)

Irjet v7 i4693
Irjet v7 i4693Irjet v7 i4693
Irjet v7 i4693
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
Windows10_IoT_business_challenge-Avinash
Windows10_IoT_business_challenge-AvinashWindows10_IoT_business_challenge-Avinash
Windows10_IoT_business_challenge-Avinash
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)
 
G data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_usG data mobile_mwr_q2_2015_us
G data mobile_mwr_q2_2015_us
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of Biometrics
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложенийSECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
 

Viewers also liked

Tingulli trent
Tingulli trentTingulli trent
Tingulli trentEGLI TAFA
 
Cedolare secca
Cedolare seccaCedolare secca
Cedolare seccanavacasa
 
Webmail - Our guide to online advertising Volume 3
Webmail - Our guide to online advertising Volume 3Webmail - Our guide to online advertising Volume 3
Webmail - Our guide to online advertising Volume 3Dennis Armstrong
 
Poyry Chemical Industry
Poyry Chemical IndustryPoyry Chemical Industry
Poyry Chemical IndustryJarmoSuominen
 
Ingeniería ambiental
Ingeniería ambientalIngeniería ambiental
Ingeniería ambientalhome
 
La autonomia del derecho a la informacion
La autonomia del derecho a la informacionLa autonomia del derecho a la informacion
La autonomia del derecho a la informacionAna Liliana Flores
 
Komplexitätsreduktion, Schwarmintelligenz und Unternehmenserfolg. Verborgenes...
Komplexitätsreduktion, Schwarmintelligenz und Unternehmenserfolg. Verborgenes...Komplexitätsreduktion, Schwarmintelligenz und Unternehmenserfolg. Verborgenes...
Komplexitätsreduktion, Schwarmintelligenz und Unternehmenserfolg. Verborgenes...Dr. Daniel C. Schmid
 
Draft profil kesiapsiagaan menghadapi tsunami kab tulungagung
Draft profil kesiapsiagaan menghadapi tsunami kab tulungagungDraft profil kesiapsiagaan menghadapi tsunami kab tulungagung
Draft profil kesiapsiagaan menghadapi tsunami kab tulungagungSapik Bubud
 
Planificación y Dirección Estratégica. Presentación de Servicios Profesionales.
Planificación y Dirección Estratégica. Presentación de Servicios Profesionales.Planificación y Dirección Estratégica. Presentación de Servicios Profesionales.
Planificación y Dirección Estratégica. Presentación de Servicios Profesionales.José Manuel Arroyo Quero
 
The Hidden Security Danger – Don’t Let Email Be Your Downfall
The Hidden Security Danger –  Don’t Let Email Be Your Downfall The Hidden Security Danger –  Don’t Let Email Be Your Downfall
The Hidden Security Danger – Don’t Let Email Be Your Downfall Justin Pirie
 
Migraña postural y resonancia magnética
Migraña postural y resonancia magnéticaMigraña postural y resonancia magnética
Migraña postural y resonancia magnéticaDaniela Sandoval
 
Elaboración de portafolios: 2a. sesión de actualización LEPe
Elaboración de portafolios: 2a. sesión de actualización LEPeElaboración de portafolios: 2a. sesión de actualización LEPe
Elaboración de portafolios: 2a. sesión de actualización LEPeLic. en Educación Preescolar BINE
 
Unwritten Rules: Brands, Social Psychology and Social Media
Unwritten Rules: Brands, Social Psychology and Social MediaUnwritten Rules: Brands, Social Psychology and Social Media
Unwritten Rules: Brands, Social Psychology and Social Mediafrog
 
historia de la arq3
historia de la arq3historia de la arq3
historia de la arq3mariajgp20
 
DESIGN HOTELS: EXCHANGE AT SIDE HOTEL IN HAMBURG
DESIGN HOTELS: EXCHANGE AT SIDE HOTEL IN HAMBURGDESIGN HOTELS: EXCHANGE AT SIDE HOTEL IN HAMBURG
DESIGN HOTELS: EXCHANGE AT SIDE HOTEL IN HAMBURGDesign Hotels AG
 

Viewers also liked (20)

Tingulli trent
Tingulli trentTingulli trent
Tingulli trent
 
Cedolare secca
Cedolare seccaCedolare secca
Cedolare secca
 
Webmail - Our guide to online advertising Volume 3
Webmail - Our guide to online advertising Volume 3Webmail - Our guide to online advertising Volume 3
Webmail - Our guide to online advertising Volume 3
 
lklklk
lklklklklklk
lklklk
 
Poyry Chemical Industry
Poyry Chemical IndustryPoyry Chemical Industry
Poyry Chemical Industry
 
Ingeniería ambiental
Ingeniería ambientalIngeniería ambiental
Ingeniería ambiental
 
La autonomia del derecho a la informacion
La autonomia del derecho a la informacionLa autonomia del derecho a la informacion
La autonomia del derecho a la informacion
 
Investigacion de material didactico
Investigacion de material didacticoInvestigacion de material didactico
Investigacion de material didactico
 
Canalizaciones electricas
Canalizaciones electricasCanalizaciones electricas
Canalizaciones electricas
 
Komplexitätsreduktion, Schwarmintelligenz und Unternehmenserfolg. Verborgenes...
Komplexitätsreduktion, Schwarmintelligenz und Unternehmenserfolg. Verborgenes...Komplexitätsreduktion, Schwarmintelligenz und Unternehmenserfolg. Verborgenes...
Komplexitätsreduktion, Schwarmintelligenz und Unternehmenserfolg. Verborgenes...
 
Draft profil kesiapsiagaan menghadapi tsunami kab tulungagung
Draft profil kesiapsiagaan menghadapi tsunami kab tulungagungDraft profil kesiapsiagaan menghadapi tsunami kab tulungagung
Draft profil kesiapsiagaan menghadapi tsunami kab tulungagung
 
Planificación y Dirección Estratégica. Presentación de Servicios Profesionales.
Planificación y Dirección Estratégica. Presentación de Servicios Profesionales.Planificación y Dirección Estratégica. Presentación de Servicios Profesionales.
Planificación y Dirección Estratégica. Presentación de Servicios Profesionales.
 
The Hidden Security Danger – Don’t Let Email Be Your Downfall
The Hidden Security Danger –  Don’t Let Email Be Your Downfall The Hidden Security Danger –  Don’t Let Email Be Your Downfall
The Hidden Security Danger – Don’t Let Email Be Your Downfall
 
Migraña postural y resonancia magnética
Migraña postural y resonancia magnéticaMigraña postural y resonancia magnética
Migraña postural y resonancia magnética
 
Elaboración de portafolios: 2a. sesión de actualización LEPe
Elaboración de portafolios: 2a. sesión de actualización LEPeElaboración de portafolios: 2a. sesión de actualización LEPe
Elaboración de portafolios: 2a. sesión de actualización LEPe
 
Recetas de cosina
Recetas de cosinaRecetas de cosina
Recetas de cosina
 
Unwritten Rules: Brands, Social Psychology and Social Media
Unwritten Rules: Brands, Social Psychology and Social MediaUnwritten Rules: Brands, Social Psychology and Social Media
Unwritten Rules: Brands, Social Psychology and Social Media
 
historia de la arq3
historia de la arq3historia de la arq3
historia de la arq3
 
Orientaciones 2009
Orientaciones 2009Orientaciones 2009
Orientaciones 2009
 
DESIGN HOTELS: EXCHANGE AT SIDE HOTEL IN HAMBURG
DESIGN HOTELS: EXCHANGE AT SIDE HOTEL IN HAMBURGDESIGN HOTELS: EXCHANGE AT SIDE HOTEL IN HAMBURG
DESIGN HOTELS: EXCHANGE AT SIDE HOTEL IN HAMBURG
 

Similar to Take Control of Mobile Forensics

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesAshish Sutar
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensicsi4box Anon
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesLeMeniz Infotech
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
IoT Middleware Market
IoT Middleware MarketIoT Middleware Market
IoT Middleware MarketHarshalBamble
 
Mobile Device Detection - Every Device Matters
Mobile Device Detection - Every Device MattersMobile Device Detection - Every Device Matters
Mobile Device Detection - Every Device MattersVamsi Koka
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 

Similar to Take Control of Mobile Forensics (20)

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
IoT Middleware Market
IoT Middleware MarketIoT Middleware Market
IoT Middleware Market
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Mobile Device Detection - Every Device Matters
Mobile Device Detection - Every Device MattersMobile Device Detection - Every Device Matters
Mobile Device Detection - Every Device Matters
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 

Take Control of Mobile Forensics

  • 1. Take Control of your Investigations. The only mobile forensic solution that enables you to adapt to ever-changing mobile device technology and address new challenges in real time. BROCHURE Mobile Phone Examiner Plus® (MPE+® )
  • 2. www.AccessData.com © 2014 AccessData Group Key Features Supports 10,000+ mobile devices (with Chinese chipset device collection add- on VELOCITOR). Physical extraction of Android™ devices, with password bypass capabilities. Logical extraction of Android devices without the need to know the manufacture or model. Logical extraction of “burner” Android devices utilizing dSOLO. Physical extraction of iOS® devices. Logical extraction of iOS devices without the need of iTunes. 30% faster than leading competitors in logical extraction of iOS and Android devices utilizing the iLogical and dLogical data collection capabilities SQLBuilder allows examiners to parse the data of all applications containing a SQLite database. "ZeroDay applications" can be supported, allowing examiners to build and save their own scripts to extract and analyze application data. pythonScripter provides users with the ability to build python scripts to parse anything from a mobile device with an easy-to-use interface. Unlike other solutions, MPE+ pythonScripter acts upon a copy of the evidence, not the original binary or evidence file. Advanced Analytics with Graphical Data Visualization allows users to get a timeline view of device communication that can be customized to the year, month, day or hour; quickly filtering the relevant data. Output all the data or selected data in several different report formats with customizable reports. Advanced Alert Manager gives the examiner the ability to import or create predefined words, phrases, numbers, etc and search the entire data set to help uncover key evidence in a matter of minutes. Alerts can be ran per case or for all collections; helping to triage large datasets for specific criteria. MPE+ is the perfect choice for mobile forensics examiners looking to upgrade their capabilities. Today, most crimes involve electronic evidence contained on mobile devices; quickly identifying this evidence is not only critical in resolving these crimes but also streamlines case processing to help reduce case backlogs. AccessData’s Mobile Phone Examiner Plus (MPE+) provides you with the tools necessary to identify, collect and effectively uncover the key data other solutioottns miss. MPE+ supports even the most challenging mobile device profiles and offers the broad capabilities of high-priced tools at a fraction of the cost. Features advanced carving, deleted data recovery, application data extraction and analysis, SQLite database browsing, filtering options and more. Mobile device technology is ever-changing. It's almost impossible to maintain the quality and efficiency of mobile forensic tools with such technology changing cycles so frequently. Mobile technology is progressing at such a rapid rate, it’s difficult for mobile forensic solutions to keep up. Most forensic tools require regular updates to keep pace with the volatility of mobile technologies and are often overwhelmed. Typically, forensic tools are antiquated technology at the time of their release since mobile device application updates are anything but routine. MPE+ overcomes all the variations of mobile devices—different hardware, OS versions, updates, etc.—by providing investigators with an easy-to-use yet comprehensive solution that works on today’s technology and future variations without the need for constant software upgrades. The MPE+ pythonScripter allows the examiner to create, import or use preconfigured python scripts against data imported into the MPE+ solution. This allows MPE+ to support a near unlimited volume of devices, data types, application specific data and digital metadata. >50% of the U.S. population uses smart devices. >95% use Mobile Device applications daily for communication purposes, social media, and financial transactions. Law enforcement must be able to identify and examine all the apps that reside on a mobile device, and they must be able to extract the data associated with those apps. They need a mobile device forensics solution that’s flexible enough to keep up with the fast-moving landscape of mobile apps and smart enough to uncover the hidden evidence those apps often hold. MPE+ is the only mobile forensic tool on the market that allows you to build simple SQL queries to extract hidden application data from all applications containing a SQLite database. Because of this capability, MPE+ can support most applications available—no need to wait for a software upgrade!
  • 3. © 2014 AccessData Group www.AccessData.com Mobile forensic investigators can no longer rely on “push button” mobile forensics tools that are unable to uncover ALL data available on mobile devices. Research shows that only 5 to 10 percent of the entire corpus of user data is examined by typical mobile device forensics tools. This leaves as much as 95% of application data uncollected, and therefore unanalyzed. MPE+ not only acquires Android and iOS devices 30% faster than competitor tools but also uncovers more critical user data from these devices than any other tool on the market. It bypasses select Android and iOS device “locks” and performs advanced iOS acquisitions even when the iTunes® password is not known. The rising tide of mobile malware is forcing forensics examiners to understand how to recognize and analyze it together with other evidence. Furthermore, the increase in the number of apps on the device increases the likelihood that some may contain malicious code or security holes. MPE+ allows you to identify, analyze and document these threats without the need of built in signature based tools. With MPE+, you can mount a collected image and use any custom malware tool, as well as commercial anti- virus, to scan for threats. A portable device can contain gigabytes of data. This increases the security risk for enterprises utilizing BYOD. MPE+ helps enterprises address BYOD (Bring Your Own Device) risks by allowing them to collect data from employee’s mobile devices when a threat is identified. It not only allows them to visualize and analyze contact and communication data, but can also identify elements that may have lead to a security breach (IP addresses accessed, internet traffic, domains accessed, etc.). MPE+ transforms this big data into data intelligence to help pinpoint the meaningful information needed for data interpretation and incident remediation. WORST CASE SCENARIO: BEST CASE SCENARIO: If you haven't encountered mobile malware yet, you will soon. Mobile malware harms the integrity of evidence presented in a court of law. Mobile malware introduces a delay in the investigation. First responders lack the clearance, tools and training to search a phone. MPE+ is a critical tool for us to manage our growing case load. Detective Tyler Clarke, Lead Investigator, Reno Police Dept. Forensics Unit Support 95% of Chinese Devices by adding MPE+ VELOCITOR In many cases, a mobile device may look like a mainstream smart device, but it is actually a cloned or counterfeit devices known as Shanzhai phones. In those instances, most mobile forensics solutions fall short, making it impossible to process critical data. MPE+ VELOCITOR is an MPE+ add-on hardware that enables the full flash data extraction from these devices, exposing critical evidence quickly without the need for a third-party tool or software. A simpler, inexpensive solution for data collection in the field. MPE+ nFIELD combines the powerful mobile device extraction capabilities of MPE+ with a simple user interface specifically ideal for non tech users. The wizard-driven interface allows you to forensically collect from mobile devices on-scene with practically zero training. MPE+ nFIELD
  • 4. LEARN MORE: www.AccessData.com GLOBAL HEADQUARTERS +1 801 377 5410 588 West 300 South Lindon, Utah USA NORTH AMERICAN SALES +1 800 574 5199 Fax: +1 801 765 4370 sales@accessdata.com INTERNATIONAL SALES +44 20 7010 7800 internationalsales@accessdata.com Fast logical extraction of iOS and Android devices utilizing iLogical and dLogical data collection capabilities. Build python scripts with pythonScripter to parse anything from a mobile device on an easy to use interface. This allows limitless support for any device. Unlike other solutions on the market, MPE+ pythonScripter acts upon a copy of the evidence, not the original binary or evidence file. This insures the MPE+ solution will not change or alter the original files, folders or any associated data. MPE+ Mobile Phone Examiner Plus LEARN MORE Case Study: In processing a suspect’s iPhone 4 with Cellebrite’s UFED, Sgt. Sneary utilized MPE+’s iLogical support for iOS devices to validate findings by Cellebrite. By utilizing MPE+’s iLogical support for iOS devices, Sgt. Sneary was able to carve 13,000 more images than what was first extracted when Cellebrite’s UFED tool was used.