SlideShare a Scribd company logo
1 of 4
Download to read offline
BROCHURE
AD Lab
Divide, Collaborate and Conquer!
Complete caseload control through division of labor, collaborative
analysis, centralized case management and web-based review.
www.AccessData.com © 2014 AccessData Group
Key Features
Examiners can work their own
cases, sharing a centralized
infrastructure for storage and
processing.
Electronic evidence can be fully
secured at the case or file level.
Granular, role-based administration
allows administrators to assign
users to a given case or set of data
within a case.
Restrict users by feature, so only
qualified users can access more
advances functions.
Multi-machine, forensic analysis
with wizard-driven processing,
filtering and reporting.
Market-leading decryption
password cracking and recovery.
Simultaneous collaboration is
enabled through database backend.
Distributed processing allows
investigators to process massive
amounts of data with ease.
User-friendly web interface
enables true native review without
having to convert HTML or image
format.
Integrates with FTK, AD Enterprise
and Resolution1 eDiscovery to
streamline investigations for law
enforcement, government and
corporate labs.
Digital forensics units throughout the world are inundated
with ever-growing caseloads and increasingly massive
data sets. AD Lab helps forensics labs gain control over
their caseload by enabling examiners to work cases
faster and more efficiently.
AD Lab is a centralized investigative platform that enables division of
labor, collaborative analysis, centralized case management and web-
based review, thereby dramatically streamlining the investigative process.
It enables computer forensic labs facing an array of challenges to work
more effectively by distributing the processing of data to several forensic
specialists. Specialists are able to provide input from their fields of
expertise, dramatically increasing case processing and resolution speed.
Work cases faster by leveraging a centralized
database that facilitates collaboration, proper case
review and analysis.
AD Lab allows both forensic examiners and those without any computer
forensics training to review and comment on data through a secure web
interface. This enables both computer forensics colleagues and non-
technical players, such as attorneys, human resources personnel and
outside experts to participate in the investigative process without delay,
regardless of their locations. With this “divide and conquer” approach, high
priority cases can be turned around at speeds that no single investigator
could achieve. While this platform enables collaboration, examiners are still
able to work an entire case on their own workstations.
Handle large case data sets to ensure proper forensic
readiness through a single distributed platform.
The traditional model in which one examiner works a case from beginning to
end (linear investigation) is no longer the most productive approach due to
the ever increasing case backlogs and data volumes. Remove the confines
of traditional stand-alone solutions through a distributed platform that can
handle large case data sets as well as reduce the constraints related to
time and budgetary challenges. Increasingly cases demand a solution that
amplifies existing resources while increasing efficiency. With AD Lab each
investigator can control who is able to view specific data sets with granular,
role-based permissions. This enables each responsible party to participate
in the investigative process according to their area of expertise, thus
maximizing the use of digital evidence while minimizing costs associated
with the investigation.
With FTK and AD Lab, we are able to
quickly train investigators to use the
interface and collaborate on early
case assessment. This frees up highly
qualified digital forensics analysts to
focus on analysis.
Major Keith Miller, Officer Commanding, Service
Police Crime Bureau, Royal Military Police (fmr.)
© 2014 AccessData Group www.AccessData.com
Key Benefits
MANAGE MULTIPLE CASES AND MULTIPLE EXAMINERS
Examiners in distributed labs can work together on the same case.
	 Role-based case access controls who can view which cases and associated data.
STREAMLINE THE INVESTIGATIVE PROCESS WITH COLLABORATIVE ANALYSIS
Collaborate on the same case at the same time, utilizing a division-of-labor approach.
Examiners can each work their own cases, sharing a centralized infrastructure for storage and processing.
Examiners using FTK as well as non-technical users can work a case at the same time.
Easy to use web based review console delivers advanced analytics:
»	 Email discussion threading.
»	 Sophisticated searching capabilities: Fuzzy, Stemming, Related Words, Phonic, Wildcard, Proximity and Concept.
»	 Search hit highlighting in files, emails and attachments.
»	 Search relevancy ranking.
»	 Advanced tagging/labeling options.
»	 Bookmark items into categories and include comments.
»	 Split screen support.
»	 And more…
ENTERPRISE-CLASS, CENTRALIZED ARCHITECTURE FOR EASE-OF-USE AND MANAGEMENT
Database backend enables simultaneous collaboration.
Centralized processing indexing and data storage.
Fully leverage the cutting-edge data processing and analysis capabilities of Forensic Toolkit® (FTK®) technology:
»	 Customizable interface.
»	 Advance data modeling.
»	 Unsurpassed email analysis.
»	 Memory search and analysis.
»	 Utilize 100% of hardware resources from multi-threaded/ulti-core computers during case data processing.
»	 And more…
AD Lab vs. FTK
A single-person lab can radically speed up
the processing of cases with the four-worker
distributed processing available with FTK.
However, forensic analysis labs handling
massive data sets, utilizing a distributed
workforce, or looking to collaborate with
attorneys, HR personnel or other non-forensic
parties can step up to AD Lab. This can be
accomplished without sacrificing any of
the expert capabilities of FTK! FTK is 100%
interoperable with AD Lab. Login to FTK and
use it alongside another team of reviewers
working in the web-based console.
Forensic Toolkit (FTK) AD Lab
Processing Engines 3 additional processing engines
Multiple cluster processing
engines
Database User
Access
Supports a single database for
a single installation of the UI
(multiple users have to log in one
at a time)
Supports a single instance of
a database with multiple users
logged in concurrently
Web Review
Interface
Not Available Yes
Permissions Basic Granular
Backup
Each installation requires
dedicated backup and case data
management
Single point of backup for
all users, cases, evidence,
database, etc.
Email Threading Not Available Yes
Email Deduplication Not Available Yes
OCR Basic OCR Enhanced OCR
Load File Generation Not Available Yes
LEARN MORE: www.AccessData.com
GLOBAL HEADQUARTERS
+1 801 377 5410
588 West 300 South
Lindon, Utah
USA
NORTH AMERICAN SALES
+1 800 574 5199
Fax: +1 801 765 4370
sales@accessdata.com
INTERNATIONAL SALES
+44 20 7010 7800
internationalsales@accessdata.com
Divide and conquer by taking an enterprise approach to large case data
through collaboration and a centralized AD Lab solution.
LEARN MORE
Case Study: Royal Military Police
choose AD Lab because it enables
them to work faster and more
efficiently with large data sets.
CENTRALIZED PROCESSING FARM
CENTRALIZED DATABASE
SUBJECT MATTER EXPERT
MOBILE ANALYSIS
DISTRICT ATTORNEY'S OFFICE
INVESTIGATOR
COMPUTER FORENSICS LAB INVESTIGATORS
AD Lab | Sample Architecture

More Related Content

What's hot

ICPSR Data Managment
ICPSR Data ManagmentICPSR Data Managment
ICPSR Data ManagmentICPSR
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkillijtsrd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Darshan Gorasiya
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...IRJET Journal
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
Blue Canopy Semantic Web Approach v25 brief
Blue Canopy Semantic Web Approach v25 briefBlue Canopy Semantic Web Approach v25 brief
Blue Canopy Semantic Web Approach v25 briefNick Savage
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14Russ Holmes
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete SeminarSumit Thakur
 
Maven and google pharma r&d (1)
Maven and google pharma r&d  (1)Maven and google pharma r&d  (1)
Maven and google pharma r&d (1)Matt Barnes
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDJournal For Research
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
4. New metadata developments
4. New metadata developments4. New metadata developments
4. New metadata developmentsCrossref
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionrejii
 
Unstructured Data Fact Sheet
Unstructured Data Fact SheetUnstructured Data Fact Sheet
Unstructured Data Fact SheetConnexica
 

What's hot (19)

ICPSR Data Managment
ICPSR Data ManagmentICPSR Data Managment
ICPSR Data Managment
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
Blue Canopy Semantic Web Approach v25 brief
Blue Canopy Semantic Web Approach v25 briefBlue Canopy Semantic Web Approach v25 brief
Blue Canopy Semantic Web Approach v25 brief
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14
 
P2 Project
P2 ProjectP2 Project
P2 Project
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Maven and google pharma r&d (1)
Maven and google pharma r&d  (1)Maven and google pharma r&d  (1)
Maven and google pharma r&d (1)
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
4. New metadata developments
4. New metadata developments4. New metadata developments
4. New metadata developments
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Unstructured Data Fact Sheet
Unstructured Data Fact SheetUnstructured Data Fact Sheet
Unstructured Data Fact Sheet
 

Viewers also liked

Syllabus tecnologia 4. 2016
Syllabus tecnologia 4. 2016Syllabus tecnologia 4. 2016
Syllabus tecnologia 4. 2016palbornozav
 
Mémoire Ingénieur KOUAO Ekra Mathieu
Mémoire Ingénieur KOUAO Ekra Mathieu Mémoire Ingénieur KOUAO Ekra Mathieu
Mémoire Ingénieur KOUAO Ekra Mathieu Mathieu Ekra Kouao
 
Resumen e invitados 2014 de HangoutON
Resumen e invitados 2014 de HangoutONResumen e invitados 2014 de HangoutON
Resumen e invitados 2014 de HangoutONHangoutON
 
Inscripcion taller red emprendimiento
Inscripcion taller red emprendimientoInscripcion taller red emprendimiento
Inscripcion taller red emprendimientoRed Emprende IE
 
Content Marketing Vorhersagen 2014 (deutsch)
Content Marketing Vorhersagen 2014 (deutsch)Content Marketing Vorhersagen 2014 (deutsch)
Content Marketing Vorhersagen 2014 (deutsch)Eduard Klein
 
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, VirginiaCleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, VirginiaClearedJobs.Net
 
Los problemas de la migración digital en la pedagogia freinet
Los problemas de la migración digital en la pedagogia freinetLos problemas de la migración digital en la pedagogia freinet
Los problemas de la migración digital en la pedagogia freinetdomingo leiva
 
CFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda RobinsonCFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda RobinsonDaniel Ross
 
Sobre la entrevista, La Antigua Guatemala
Sobre la entrevista, La Antigua GuatemalaSobre la entrevista, La Antigua Guatemala
Sobre la entrevista, La Antigua GuatemalaMiguel Moraga
 
Cuerpo, vestido y_moda.
Cuerpo, vestido y_moda.Cuerpo, vestido y_moda.
Cuerpo, vestido y_moda.emebegeeme
 
144923688 danforth-obstetrics-and-gynecology-9ed
144923688 danforth-obstetrics-and-gynecology-9ed144923688 danforth-obstetrics-and-gynecology-9ed
144923688 danforth-obstetrics-and-gynecology-9edBharti Gahtori
 
Sierra de san pedro y los baldíos
Sierra de san pedro y los baldíosSierra de san pedro y los baldíos
Sierra de san pedro y los baldíosToni Hurtado
 
Transmedia Storytelling on MICE tourism
Transmedia Storytelling on MICE tourismTransmedia Storytelling on MICE tourism
Transmedia Storytelling on MICE tourismMontecarlo -
 

Viewers also liked (20)

Syllabus tecnologia 4. 2016
Syllabus tecnologia 4. 2016Syllabus tecnologia 4. 2016
Syllabus tecnologia 4. 2016
 
Mémoire Ingénieur KOUAO Ekra Mathieu
Mémoire Ingénieur KOUAO Ekra Mathieu Mémoire Ingénieur KOUAO Ekra Mathieu
Mémoire Ingénieur KOUAO Ekra Mathieu
 
Jornal i9 1ª Edição
Jornal i9 1ª EdiçãoJornal i9 1ª Edição
Jornal i9 1ª Edição
 
Resumen e invitados 2014 de HangoutON
Resumen e invitados 2014 de HangoutONResumen e invitados 2014 de HangoutON
Resumen e invitados 2014 de HangoutON
 
Inscripcion taller red emprendimiento
Inscripcion taller red emprendimientoInscripcion taller red emprendimiento
Inscripcion taller red emprendimiento
 
Content Marketing Vorhersagen 2014 (deutsch)
Content Marketing Vorhersagen 2014 (deutsch)Content Marketing Vorhersagen 2014 (deutsch)
Content Marketing Vorhersagen 2014 (deutsch)
 
ELECTROANICA
ELECTROANICAELECTROANICA
ELECTROANICA
 
Revista ABR 2016
Revista ABR 2016Revista ABR 2016
Revista ABR 2016
 
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, VirginiaCleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
 
Los problemas de la migración digital en la pedagogia freinet
Los problemas de la migración digital en la pedagogia freinetLos problemas de la migración digital en la pedagogia freinet
Los problemas de la migración digital en la pedagogia freinet
 
CFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda RobinsonCFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda Robinson
 
Rds-Tsn Diana
Rds-Tsn   DianaRds-Tsn   Diana
Rds-Tsn Diana
 
Jardín Botánico y Zoologico de Asunción
Jardín Botánico y Zoologico de AsunciónJardín Botánico y Zoologico de Asunción
Jardín Botánico y Zoologico de Asunción
 
Sobre la entrevista, La Antigua Guatemala
Sobre la entrevista, La Antigua GuatemalaSobre la entrevista, La Antigua Guatemala
Sobre la entrevista, La Antigua Guatemala
 
Cuerpo, vestido y_moda.
Cuerpo, vestido y_moda.Cuerpo, vestido y_moda.
Cuerpo, vestido y_moda.
 
Listado de personal - BoA
Listado de personal - BoAListado de personal - BoA
Listado de personal - BoA
 
144923688 danforth-obstetrics-and-gynecology-9ed
144923688 danforth-obstetrics-and-gynecology-9ed144923688 danforth-obstetrics-and-gynecology-9ed
144923688 danforth-obstetrics-and-gynecology-9ed
 
Quiroptero
QuiropteroQuiroptero
Quiroptero
 
Sierra de san pedro y los baldíos
Sierra de san pedro y los baldíosSierra de san pedro y los baldíos
Sierra de san pedro y los baldíos
 
Transmedia Storytelling on MICE tourism
Transmedia Storytelling on MICE tourismTransmedia Storytelling on MICE tourism
Transmedia Storytelling on MICE tourism
 

Similar to AD_LABX_BRO_19Nov2014__1_

E-Discovery in the Cloud! What's the Positive Outcomes?
E-Discovery in the Cloud! What's the Positive Outcomes?E-Discovery in the Cloud! What's the Positive Outcomes?
E-Discovery in the Cloud! What's the Positive Outcomes?Benny Henson
 
CRO Solutions by Dotmatics
CRO Solutions by DotmaticsCRO Solutions by Dotmatics
CRO Solutions by DotmaticsYuri de Lugt
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010dcampbellelite
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010Darrin Campbell
 
Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Mills Davis
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014Leonard Cibelli
 
Introducing Polymerize Connect_ The Ultimate Solution for Chemical R&D (1).pdf
Introducing Polymerize Connect_ The Ultimate Solution for Chemical R&D (1).pdfIntroducing Polymerize Connect_ The Ultimate Solution for Chemical R&D (1).pdf
Introducing Polymerize Connect_ The Ultimate Solution for Chemical R&D (1).pdfGerman Rings
 
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudCloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudRobert Ambrogi
 
data_blending
data_blendingdata_blending
data_blendingsubit1615
 
data-mesh_whitepaper_dec2021.pdf
data-mesh_whitepaper_dec2021.pdfdata-mesh_whitepaper_dec2021.pdf
data-mesh_whitepaper_dec2021.pdfssuser18927d
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataCloudTechnologies
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilityNandini Chandran
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation managementAdeola Taiwo-Ogunbode
 
OpenText Legal Technology Solutions
OpenText Legal Technology SolutionsOpenText Legal Technology Solutions
OpenText Legal Technology SolutionsMarc St-Pierre
 
ESG - HDS HCP Anywhere Easy, Secure, On-Premises File Sharing
ESG - HDS HCP Anywhere Easy, Secure, On-Premises File SharingESG - HDS HCP Anywhere Easy, Secure, On-Premises File Sharing
ESG - HDS HCP Anywhere Easy, Secure, On-Premises File SharingHitachi Vantara
 

Similar to AD_LABX_BRO_19Nov2014__1_ (20)

E-Discovery in the Cloud! What's the Positive Outcomes?
E-Discovery in the Cloud! What's the Positive Outcomes?E-Discovery in the Cloud! What's the Positive Outcomes?
E-Discovery in the Cloud! What's the Positive Outcomes?
 
CRO Solutions by Dotmatics
CRO Solutions by DotmaticsCRO Solutions by Dotmatics
CRO Solutions by Dotmatics
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011
 
cli
clicli
cli
 
Obsaase
ObsaaseObsaase
Obsaase
 
4AA4-1812ENW
4AA4-1812ENW4AA4-1812ENW
4AA4-1812ENW
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014
 
Introducing Polymerize Connect_ The Ultimate Solution for Chemical R&D (1).pdf
Introducing Polymerize Connect_ The Ultimate Solution for Chemical R&D (1).pdfIntroducing Polymerize Connect_ The Ultimate Solution for Chemical R&D (1).pdf
Introducing Polymerize Connect_ The Ultimate Solution for Chemical R&D (1).pdf
 
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudCloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
 
data_blending
data_blendingdata_blending
data_blending
 
data-mesh_whitepaper_dec2021.pdf
data-mesh_whitepaper_dec2021.pdfdata-mesh_whitepaper_dec2021.pdf
data-mesh_whitepaper_dec2021.pdf
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation management
 
OpenText Legal Technology Solutions
OpenText Legal Technology SolutionsOpenText Legal Technology Solutions
OpenText Legal Technology Solutions
 
ESG - HDS HCP Anywhere Easy, Secure, On-Premises File Sharing
ESG - HDS HCP Anywhere Easy, Secure, On-Premises File SharingESG - HDS HCP Anywhere Easy, Secure, On-Premises File Sharing
ESG - HDS HCP Anywhere Easy, Secure, On-Premises File Sharing
 

AD_LABX_BRO_19Nov2014__1_

  • 1. BROCHURE AD Lab Divide, Collaborate and Conquer! Complete caseload control through division of labor, collaborative analysis, centralized case management and web-based review.
  • 2. www.AccessData.com © 2014 AccessData Group Key Features Examiners can work their own cases, sharing a centralized infrastructure for storage and processing. Electronic evidence can be fully secured at the case or file level. Granular, role-based administration allows administrators to assign users to a given case or set of data within a case. Restrict users by feature, so only qualified users can access more advances functions. Multi-machine, forensic analysis with wizard-driven processing, filtering and reporting. Market-leading decryption password cracking and recovery. Simultaneous collaboration is enabled through database backend. Distributed processing allows investigators to process massive amounts of data with ease. User-friendly web interface enables true native review without having to convert HTML or image format. Integrates with FTK, AD Enterprise and Resolution1 eDiscovery to streamline investigations for law enforcement, government and corporate labs. Digital forensics units throughout the world are inundated with ever-growing caseloads and increasingly massive data sets. AD Lab helps forensics labs gain control over their caseload by enabling examiners to work cases faster and more efficiently. AD Lab is a centralized investigative platform that enables division of labor, collaborative analysis, centralized case management and web- based review, thereby dramatically streamlining the investigative process. It enables computer forensic labs facing an array of challenges to work more effectively by distributing the processing of data to several forensic specialists. Specialists are able to provide input from their fields of expertise, dramatically increasing case processing and resolution speed. Work cases faster by leveraging a centralized database that facilitates collaboration, proper case review and analysis. AD Lab allows both forensic examiners and those without any computer forensics training to review and comment on data through a secure web interface. This enables both computer forensics colleagues and non- technical players, such as attorneys, human resources personnel and outside experts to participate in the investigative process without delay, regardless of their locations. With this “divide and conquer” approach, high priority cases can be turned around at speeds that no single investigator could achieve. While this platform enables collaboration, examiners are still able to work an entire case on their own workstations. Handle large case data sets to ensure proper forensic readiness through a single distributed platform. The traditional model in which one examiner works a case from beginning to end (linear investigation) is no longer the most productive approach due to the ever increasing case backlogs and data volumes. Remove the confines of traditional stand-alone solutions through a distributed platform that can handle large case data sets as well as reduce the constraints related to time and budgetary challenges. Increasingly cases demand a solution that amplifies existing resources while increasing efficiency. With AD Lab each investigator can control who is able to view specific data sets with granular, role-based permissions. This enables each responsible party to participate in the investigative process according to their area of expertise, thus maximizing the use of digital evidence while minimizing costs associated with the investigation. With FTK and AD Lab, we are able to quickly train investigators to use the interface and collaborate on early case assessment. This frees up highly qualified digital forensics analysts to focus on analysis. Major Keith Miller, Officer Commanding, Service Police Crime Bureau, Royal Military Police (fmr.)
  • 3. © 2014 AccessData Group www.AccessData.com Key Benefits MANAGE MULTIPLE CASES AND MULTIPLE EXAMINERS Examiners in distributed labs can work together on the same case. Role-based case access controls who can view which cases and associated data. STREAMLINE THE INVESTIGATIVE PROCESS WITH COLLABORATIVE ANALYSIS Collaborate on the same case at the same time, utilizing a division-of-labor approach. Examiners can each work their own cases, sharing a centralized infrastructure for storage and processing. Examiners using FTK as well as non-technical users can work a case at the same time. Easy to use web based review console delivers advanced analytics: » Email discussion threading. » Sophisticated searching capabilities: Fuzzy, Stemming, Related Words, Phonic, Wildcard, Proximity and Concept. » Search hit highlighting in files, emails and attachments. » Search relevancy ranking. » Advanced tagging/labeling options. » Bookmark items into categories and include comments. » Split screen support. » And more… ENTERPRISE-CLASS, CENTRALIZED ARCHITECTURE FOR EASE-OF-USE AND MANAGEMENT Database backend enables simultaneous collaboration. Centralized processing indexing and data storage. Fully leverage the cutting-edge data processing and analysis capabilities of Forensic Toolkit® (FTK®) technology: » Customizable interface. » Advance data modeling. » Unsurpassed email analysis. » Memory search and analysis. » Utilize 100% of hardware resources from multi-threaded/ulti-core computers during case data processing. » And more… AD Lab vs. FTK A single-person lab can radically speed up the processing of cases with the four-worker distributed processing available with FTK. However, forensic analysis labs handling massive data sets, utilizing a distributed workforce, or looking to collaborate with attorneys, HR personnel or other non-forensic parties can step up to AD Lab. This can be accomplished without sacrificing any of the expert capabilities of FTK! FTK is 100% interoperable with AD Lab. Login to FTK and use it alongside another team of reviewers working in the web-based console. Forensic Toolkit (FTK) AD Lab Processing Engines 3 additional processing engines Multiple cluster processing engines Database User Access Supports a single database for a single installation of the UI (multiple users have to log in one at a time) Supports a single instance of a database with multiple users logged in concurrently Web Review Interface Not Available Yes Permissions Basic Granular Backup Each installation requires dedicated backup and case data management Single point of backup for all users, cases, evidence, database, etc. Email Threading Not Available Yes Email Deduplication Not Available Yes OCR Basic OCR Enhanced OCR Load File Generation Not Available Yes
  • 4. LEARN MORE: www.AccessData.com GLOBAL HEADQUARTERS +1 801 377 5410 588 West 300 South Lindon, Utah USA NORTH AMERICAN SALES +1 800 574 5199 Fax: +1 801 765 4370 sales@accessdata.com INTERNATIONAL SALES +44 20 7010 7800 internationalsales@accessdata.com Divide and conquer by taking an enterprise approach to large case data through collaboration and a centralized AD Lab solution. LEARN MORE Case Study: Royal Military Police choose AD Lab because it enables them to work faster and more efficiently with large data sets. CENTRALIZED PROCESSING FARM CENTRALIZED DATABASE SUBJECT MATTER EXPERT MOBILE ANALYSIS DISTRICT ATTORNEY'S OFFICE INVESTIGATOR COMPUTER FORENSICS LAB INVESTIGATORS AD Lab | Sample Architecture