SlideShare a Scribd company logo
The proof is out there.
Find it, with Internet Evidence Finder (IEF) - The industry leading solution in
recovering Internet-related evidence left behind on computers.

     Internet Evidence Finder (IEF) is
     a digital forensics solution that
     can search a hard drive, live RAM
     captures, or files for Internet-
     related evidence. IEF was designed
     with digital forensics examiners/
     investigators in mind. IEF is also used
     by IT security professionals, litigation
     support personnel, incident response
     teams, cyber security specialists and
     corporate investigators.

     IEF can recover evidence left behind
     within social networking artifacts,
     instant messaging chat histories,
     popular webmail applications, web
     browsing history, and peer-to-peer file
     sharing applications.



PRODUCT FEATURES
Recovery of more types of Internet-related evidence            Simplified Workflow
	 	 Social Networking Artifacts:                              	 	 Automated check for disk encryption with Triage Edition
		 • 	Facebook, Google+, Twitter, Myspace, Bebo                	 	 Native image mounting
	 	 Instant Messenger Chat History:                           	 	 Live RAM captures with Triage Edition
			 • 	Skype, ICQ, Yahoo, GoogleTalk, MSN, 			
                                                               Rich & Comprehensive Reporting
				 AOL, mIRC, etc.		
                                                               	 	 Locations of each recovered artifact displayed for 	
	 	 Browser History:
                                                               			 easy validation
		     • 	Internet Explorer, Chrome, Safari, Firefox
                                                               	 	 Filter, sort, search, and bookmark recovered artifacts
	 	Webmail:
		     •	 Gmail, Yahoo, Hotmail                                Searching in more places
	 	 P2P applications:                                         	 	 Entire Logical or Physical Drives
	 	    •	 Ares, eMule, Shareaza, Limewire, 			                 	 	    •	 .E01/dd images supported
			 Gigatribe, Torrent                                         	 	 Unallocated space / deleted data       
                                                               	 	 Selected Files
Finding more relevant & accurate evidence                      		 • 	Including live RAM captures, network PCAP files,
	 Patent pending data recovery process
  	                                                           			 the pagefile.sys / hiberfil.sys files, and more
	 Single search for more than 50 artifacts
  	                                                           	 	 Entire user-selected folders and sub-folders
	 	 Customize your search by selecting artifacts 		           	 	 Other important areas on a hard drive where 		
			 and locations to search                                    			 evidence may be found




MILITARY/GOVERNMENT	                                   •	   LAW ENFORCEMENT	                      •	          BUSINESS
“We wanted a product that didn’t just recover browser artefacts but also addressed the importance of data from social
  networking tools and chat utilities.”
  Detective Constable Matt Johnstone, Fife Police Headquarters
  Fife, Scotland
 “Using search terms can only get you so far when you’re faced with mounds of data to parse through. I found IEF to be a
  huge value, in depth, relevant tool to nearly every exam.”
  Det. Stephen Payne, Oregon State Police
  Oregon, United States



IEF Standard Edition:                                      KEY BENEFITS
Setting the bar in digital forensics                       ROBUST SEARCH & DEPENDABLE RESULTS
IEF software comes on a USB                                IEF can recover more types of digital evidence than any other solution,
dongle and can be installed on as                          which makes it more likely to uncover critical evidence. You can do a single
many computers as necessary.                               search and find all Internet related evidence without having to try keywords,
The dongle holds the license key.                          manually carve data, or run individual scripts. It’s the closest thing to a “Find
Simply plug the USB dongle into                            All Evidence” button.
the computer on which you’re                               With our patent-pending technology, IEF finds more forms of Internet
running IEF and install the software.                      artifacts and filters out false positives. IEF is able to recover evidence from
This dongle approach allows the                            not only deleted data, but also live RAM captures, which often hold vital evidence.
flexibility to use IEF on different
workstations but it can only run on a                      ACCELERATE INVESTIGATIONS & REDUCE CASE BACKLOG
single computer at a time.                                 With the ever-growing hard drive capacities and the explosive growth in both
                                                           case loads and complexity, organizations and agencies of all kinds require
                                                           an accurate and comprehensive solution for recovering data. IEF is a rapid
                                                           automated solution that saves a tremendous amount of time and allows
IEF Triage Edition:                                        you to work on other parts of the investigation while it’s searching. It’s as
Take the power of IEF into the field                       straightforward as hitting search and coming back to a comprehensive report
The Triage Edition offers all the                          to review the results.
functionality of the Standard                              USER FRIENDLY
Edition. In addition; with Triage you                      Both experienced and new forensic examiners/investigators find the IEF user
get the following:                                         interface flexible, intuitive and easy to use. Because its reporting options are as
	 •	 Automated check for                                   impressive as its analytical capabilities, producing professional reports for both
		disk encryption                                          internal or external audiences is equally simple and straightforward. Time is of
	 •	 Built-in live RAM capture                             the essence and that is why there is no complex configuration or setup.
	 •	 Built-in drive imaging                                THE GOLD STANDARD IN DIGITAL ARTIFACT RECOVERY
	 •	 Mount and search volume 	                             IEF is considered the defacto standard for the recovery of digital evidence
		shadow copies                                            and is used by thousands of the most prestigious national security
	 •	 Ability to save all results on                        agencies, law enforcement teams, and corporations around the world.
		the dongle
                                                           COURT ADMISSIBLE
                                                           The reporting feature that’s built into IEF provides the information
                                                           examiners require to manually verify all results.


JADsoftware Inc.                                  Phone: 519-342-0195
Waterloo Research & Technology Park               Fax: 519-772-3908
295 Hagey Boulevard, N2L 6R5,                     Email: sales@jadsoftware.com
Waterloo, Ontario, Canada                         Web: www.jadsoftware.com

More Related Content

What's hot

Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
Shuvo Sarker
 
Chapter-1 (IDOL)
Chapter-1 (IDOL)Chapter-1 (IDOL)
Chapter-1 (IDOL)
schopra757
 
Android forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageAndroid forensics an Custom Recovery Image
Android forensics an Custom Recovery Image
Mohamed Khaled
 
I Want More Ninja – iOS Security Testing
I Want More Ninja – iOS Security TestingI Want More Ninja – iOS Security Testing
I Want More Ninja – iOS Security Testing
Jason Haddix
 
iOS Application Penetration Testing
iOS Application Penetration TestingiOS Application Penetration Testing
iOS Application Penetration Testing
n|u - The Open Security Community
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applications
Satish b
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
National Cheng Kung University
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applications
eightbit
 
Android Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsAndroid Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android Apps
Moe Tanabian
 
441 presentation 4
441 presentation 4441 presentation 4
441 presentation 4
Davis Vorva
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
antitree
 
441 presentation 5
441 presentation 5441 presentation 5
441 presentation 5
Ashwin Fujii
 
Metadata - What is Unseen
Metadata - What is UnseenMetadata - What is Unseen
Metadata - What is Unseen
Edith Cowan University
 
Toorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for ThatToorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for That
Eric Monti
 
iOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic TechniquesiOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic Techniques
Ömer Coşkun
 
iPhone forensics on iOS5
iPhone forensics on iOS5iPhone forensics on iOS5
iPhone forensics on iOS5
Satish b
 
Complete security package for usb thumb drive
Complete security package for usb thumb driveComplete security package for usb thumb drive
Complete security package for usb thumb drive
Alexander Decker
 

What's hot (17)

Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
 
Chapter-1 (IDOL)
Chapter-1 (IDOL)Chapter-1 (IDOL)
Chapter-1 (IDOL)
 
Android forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageAndroid forensics an Custom Recovery Image
Android forensics an Custom Recovery Image
 
I Want More Ninja – iOS Security Testing
I Want More Ninja – iOS Security TestingI Want More Ninja – iOS Security Testing
I Want More Ninja – iOS Security Testing
 
iOS Application Penetration Testing
iOS Application Penetration TestingiOS Application Penetration Testing
iOS Application Penetration Testing
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applications
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applications
 
Android Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsAndroid Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android Apps
 
441 presentation 4
441 presentation 4441 presentation 4
441 presentation 4
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
441 presentation 5
441 presentation 5441 presentation 5
441 presentation 5
 
Metadata - What is Unseen
Metadata - What is UnseenMetadata - What is Unseen
Metadata - What is Unseen
 
Toorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for ThatToorcon 2010: IPhone Rootkits? There's an App for That
Toorcon 2010: IPhone Rootkits? There's an App for That
 
iOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic TechniquesiOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic Techniques
 
iPhone forensics on iOS5
iPhone forensics on iOS5iPhone forensics on iOS5
iPhone forensics on iOS5
 
Complete security package for usb thumb drive
Complete security package for usb thumb driveComplete security package for usb thumb drive
Complete security package for usb thumb drive
 

Similar to Internet Evidence Finder Overview

IEF for Business
IEF for Business IEF for Business
IEF for Business
JADsoftware
 
IEF for Law Enforcement
IEF for Law EnforcementIEF for Law Enforcement
IEF for Law Enforcement
JADsoftware
 
Firmware analysis 101
Firmware analysis 101Firmware analysis 101
Firmware analysis 101
veerababu penugonda(Mr-IoT)
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014
Leonard Cibelli
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
Karter Rohrer
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
MAHESHUMANATHGOPALAK
 
SOC-BlueTEam.pdf
SOC-BlueTEam.pdfSOC-BlueTEam.pdf
SOC-BlueTEam.pdf
BeratAkit
 
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
EMERSON EDUARDO RODRIGUES
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
Sreekanth Narendran
 
IEF for Military and Government
IEF for Military and GovernmentIEF for Military and Government
IEF for Military and Government
JADsoftware
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
Megha Sahu
 
soctool.pdf
soctool.pdfsoctool.pdf
soctool.pdf
nitinscribd
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
Blancco
 
OpenVINO introduction
OpenVINO introductionOpenVINO introduction
OpenVINO introduction
Yury Gorbachev
 
iOS Forensics
iOS Forensics iOS Forensics
iOS Forensics
Tjylen Veselyj
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
IIJ
 
Why cant all_data_be_the_same
Why cant all_data_be_the_sameWhy cant all_data_be_the_same
Why cant all_data_be_the_same
Skyler Lewis
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libin
libinp
 

Similar to Internet Evidence Finder Overview (20)

IEF for Business
IEF for Business IEF for Business
IEF for Business
 
IEF for Law Enforcement
IEF for Law EnforcementIEF for Law Enforcement
IEF for Law Enforcement
 
Firmware analysis 101
Firmware analysis 101Firmware analysis 101
Firmware analysis 101
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
SOC-BlueTEam.pdf
SOC-BlueTEam.pdfSOC-BlueTEam.pdf
SOC-BlueTEam.pdf
 
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
IEF for Military and Government
IEF for Military and GovernmentIEF for Military and Government
IEF for Military and Government
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
 
soctool.pdf
soctool.pdfsoctool.pdf
soctool.pdf
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
 
OpenVINO introduction
OpenVINO introductionOpenVINO introduction
OpenVINO introduction
 
iOS Forensics
iOS Forensics iOS Forensics
iOS Forensics
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
 
Why cant all_data_be_the_same
Why cant all_data_be_the_sameWhy cant all_data_be_the_same
Why cant all_data_be_the_same
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libin
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 

Internet Evidence Finder Overview

  • 1. The proof is out there. Find it, with Internet Evidence Finder (IEF) - The industry leading solution in recovering Internet-related evidence left behind on computers. Internet Evidence Finder (IEF) is a digital forensics solution that can search a hard drive, live RAM captures, or files for Internet- related evidence. IEF was designed with digital forensics examiners/ investigators in mind. IEF is also used by IT security professionals, litigation support personnel, incident response teams, cyber security specialists and corporate investigators. IEF can recover evidence left behind within social networking artifacts, instant messaging chat histories, popular webmail applications, web browsing history, and peer-to-peer file sharing applications. PRODUCT FEATURES Recovery of more types of Internet-related evidence Simplified Workflow  Social Networking Artifacts:  Automated check for disk encryption with Triage Edition • Facebook, Google+, Twitter, Myspace, Bebo  Native image mounting  Instant Messenger Chat History:  Live RAM captures with Triage Edition • Skype, ICQ, Yahoo, GoogleTalk, MSN, Rich & Comprehensive Reporting AOL, mIRC, etc.  Locations of each recovered artifact displayed for  Browser History: easy validation • Internet Explorer, Chrome, Safari, Firefox  Filter, sort, search, and bookmark recovered artifacts  Webmail: • Gmail, Yahoo, Hotmail Searching in more places  P2P applications:  Entire Logical or Physical Drives • Ares, eMule, Shareaza, Limewire, • .E01/dd images supported Gigatribe, Torrent  Unallocated space / deleted data         Selected Files Finding more relevant & accurate evidence • Including live RAM captures, network PCAP files, Patent pending data recovery process  the pagefile.sys / hiberfil.sys files, and more Single search for more than 50 artifacts   Entire user-selected folders and sub-folders  Customize your search by selecting artifacts  Other important areas on a hard drive where and locations to search evidence may be found MILITARY/GOVERNMENT • LAW ENFORCEMENT • BUSINESS
  • 2. “We wanted a product that didn’t just recover browser artefacts but also addressed the importance of data from social networking tools and chat utilities.” Detective Constable Matt Johnstone, Fife Police Headquarters Fife, Scotland “Using search terms can only get you so far when you’re faced with mounds of data to parse through. I found IEF to be a huge value, in depth, relevant tool to nearly every exam.” Det. Stephen Payne, Oregon State Police Oregon, United States IEF Standard Edition: KEY BENEFITS Setting the bar in digital forensics ROBUST SEARCH & DEPENDABLE RESULTS IEF software comes on a USB IEF can recover more types of digital evidence than any other solution, dongle and can be installed on as which makes it more likely to uncover critical evidence. You can do a single many computers as necessary. search and find all Internet related evidence without having to try keywords, The dongle holds the license key. manually carve data, or run individual scripts. It’s the closest thing to a “Find Simply plug the USB dongle into All Evidence” button. the computer on which you’re With our patent-pending technology, IEF finds more forms of Internet running IEF and install the software. artifacts and filters out false positives. IEF is able to recover evidence from This dongle approach allows the not only deleted data, but also live RAM captures, which often hold vital evidence. flexibility to use IEF on different workstations but it can only run on a ACCELERATE INVESTIGATIONS & REDUCE CASE BACKLOG single computer at a time. With the ever-growing hard drive capacities and the explosive growth in both case loads and complexity, organizations and agencies of all kinds require an accurate and comprehensive solution for recovering data. IEF is a rapid automated solution that saves a tremendous amount of time and allows IEF Triage Edition: you to work on other parts of the investigation while it’s searching. It’s as Take the power of IEF into the field straightforward as hitting search and coming back to a comprehensive report The Triage Edition offers all the to review the results. functionality of the Standard USER FRIENDLY Edition. In addition; with Triage you Both experienced and new forensic examiners/investigators find the IEF user get the following: interface flexible, intuitive and easy to use. Because its reporting options are as • Automated check for impressive as its analytical capabilities, producing professional reports for both disk encryption internal or external audiences is equally simple and straightforward. Time is of • Built-in live RAM capture the essence and that is why there is no complex configuration or setup. • Built-in drive imaging THE GOLD STANDARD IN DIGITAL ARTIFACT RECOVERY • Mount and search volume IEF is considered the defacto standard for the recovery of digital evidence shadow copies and is used by thousands of the most prestigious national security • Ability to save all results on agencies, law enforcement teams, and corporations around the world. the dongle COURT ADMISSIBLE The reporting feature that’s built into IEF provides the information examiners require to manually verify all results. JADsoftware Inc. Phone: 519-342-0195 Waterloo Research & Technology Park Fax: 519-772-3908 295 Hagey Boulevard, N2L 6R5, Email: sales@jadsoftware.com Waterloo, Ontario, Canada Web: www.jadsoftware.com