AccessData Detect Remediate Preserve Analyze Identify
Founded 1987 Based in Lindon, Utah Roots in password recovery and code breaking Best known for Forensic Toolkit ®  (FTK™)  Most user-friendly interface Tool of choice for email analysis Court-validated digital investigative solution used worldwide 100,000+ Clients Train more than 6,000 individuals annually
Data sets are increasing exponentially Organizations policies and procedures aren’t adapting to the change Evidence is located in many different locations Criminals are organized and technically savvy  Encryption is prevalent at the disk & file level Investigators need to collaborate Non experts need access to case data  Automation is necessary to reduce the overall time of investigations and backlog
 
FBI Secret Service IRS Brazilian Federal Police Mexico PGR Portuguese Judicial Police FEMSA Schlumberger Exxon BP EDS 5 th  3 rd  Bank State Street Bank Morgan Stanley Barclays
AD Enterprise: Functionality Management Server Agents on Target Workstations /Servers Examiner Workstation
AccessData Lab: Functionality Investigator Analyst Reviewer Legal/HR Centralized Database Infrastructure Distributed  Processing Workers Evidence Web Services GUI
SilentRunner Sentinel: Functionality Network A Network B Network C Collectors Loader Database Analyst Workstation
Visualization Visual analysis of network data from internal and external networks in order to obtain total insight (visibility) into the network. Incident Response, Root Cause Analysis, Forensic Analysis, Log Analysis, Policy Verification / Enforcement, Network Planning  Data  Manager Metadata &  Content Analysis Post Event Post Event Real Time Traffic  Analysis Knowledge Base
AD eDiscovery: Functionality eDiscManager Authentication & Orchestration Services Custodian Workstations  /Servers Collection Services Processing  Service Web Services Administrator Paralegal Structured Data Email Servers \ Archives Desired Output
AccessData

Access data

  • 1.
    AccessData Detect RemediatePreserve Analyze Identify
  • 2.
    Founded 1987 Basedin Lindon, Utah Roots in password recovery and code breaking Best known for Forensic Toolkit ® (FTK™) Most user-friendly interface Tool of choice for email analysis Court-validated digital investigative solution used worldwide 100,000+ Clients Train more than 6,000 individuals annually
  • 3.
    Data sets areincreasing exponentially Organizations policies and procedures aren’t adapting to the change Evidence is located in many different locations Criminals are organized and technically savvy Encryption is prevalent at the disk & file level Investigators need to collaborate Non experts need access to case data Automation is necessary to reduce the overall time of investigations and backlog
  • 4.
  • 5.
    FBI Secret ServiceIRS Brazilian Federal Police Mexico PGR Portuguese Judicial Police FEMSA Schlumberger Exxon BP EDS 5 th 3 rd Bank State Street Bank Morgan Stanley Barclays
  • 6.
    AD Enterprise: FunctionalityManagement Server Agents on Target Workstations /Servers Examiner Workstation
  • 7.
    AccessData Lab: FunctionalityInvestigator Analyst Reviewer Legal/HR Centralized Database Infrastructure Distributed Processing Workers Evidence Web Services GUI
  • 8.
    SilentRunner Sentinel: FunctionalityNetwork A Network B Network C Collectors Loader Database Analyst Workstation
  • 9.
    Visualization Visual analysisof network data from internal and external networks in order to obtain total insight (visibility) into the network. Incident Response, Root Cause Analysis, Forensic Analysis, Log Analysis, Policy Verification / Enforcement, Network Planning Data Manager Metadata & Content Analysis Post Event Post Event Real Time Traffic Analysis Knowledge Base
  • 10.
    AD eDiscovery: FunctionalityeDiscManager Authentication & Orchestration Services Custodian Workstations /Servers Collection Services Processing Service Web Services Administrator Paralegal Structured Data Email Servers \ Archives Desired Output
  • 11.

Editor's Notes

  • #5 All of our technology is based around our forensically sound capture methodology that is represented in the green box. You are required to have physical access to a machine in order to leverage this technology. This is being utilized by most local and federal law enforcement agencies as well as thousands of corporations for tactical employee investigations. The focus of this meeting is centered on the blue and orange boxes which represent our eDiscovery and Enterprise technologies. Enterprise was created to give our clients the ability to conduct computer investigations across the network without having to seize the employees computer, while our eDiscovery product was developed to help automate the process of collecting large amounts of data from numerous systems (structured/unstructured) simultaneously, then giving you the ability to further process/index that data conduct first pass review and determine your final production format of choice. Our over all goal is to help our clients bring these processes in house and break the dependency on outsourcing these types of functions. In the US we see the average cost per custodian (individual who owns the data/machines) being around $20,000 USD just to collect and process the data, that doesn’t include the final attorney review which usually costs $300/hr.