SlideShare a Scribd company logo
1 of 21
The Most Effective Digital Forensics Case Management
System available – an Essential Investment for any
investigations team
Example Users
Lima User Community
“Using Lima has given Humberside Police HTCU significant time savings and exhibit continuity. Hardware and software can be
tracked to all cases they have been used on – ISO standards and forensic regulation will make this a ‘must have’ for digital
forensics...”
Dave Littlewood, HTCU Manager, Humberside Police, UK
"Lima is the perfect addition to our current strict procedures and controls. Lima allows us to implement the accountability and
auditing we need in our quest for ASCLD accreditation". ,”
Lance Fogarty, CEO of PROTEGGA LLC, USA

“Through the use of the Lima Forensic Case Management solution in support of our validation methodologies, we have been able
to achieve the ISO 17025 accreditation standard. One of the most invaluable aspects of the Lima system has been to standardise
and validate our processes and keep track of our asset validation within the organisation. Lima has streamlined our Forensic case
management workflows and has been invaluable in obtaining accreditation"
Geoff Boyd, Director of MD5 Group, UK
Lima Product Family
Lima Version Features
Headline Benefits
• Saves Time – all case management information in one secure system –
eliminates duplication and preserves control

• Enables continuity - all case staff have access all the time whether
operating off-site, on-site or on shift patterns

• Easy communication - Easy search and quick access to all records, with
powerful case and management reporting features

• Understand Utilisation – of staff, assets and on processes= enabling
performance management of forensic and investigatory functions and staff

• Configure – Easily configure a system yourselves without having costly
amendments made by us – system grows and adapts as your needs evolve
Meeting Standards
• Supports ISO 9001 processes – Tailor to fit Standard Operating Procedures
• Supports ISO/IEC 27001 – control access, security permissions and
encryption of data
• Supports ISO/IEC 17025 – Forensically sound methodology at the heart of
the workflow
• Supports ISO/IEC 27037:2012 – Information technology – Security
techniques – Guidelines for identification, collection, acquisition, and
preservation of digital evidence

• Supports ASCLD/LAB accreditation
Managed Submission Process
Lima Network
•

–
–
–
–

•

Lima VPN Client

SQL Express 2005 built-in (up to 4GB 1000+ cases)
SQL Enterprise Server

Active Directory permissions
Username password combination
Security clearance levels
AES 128Bit Encryption

Lima Client

Client Systems:
–
–
–
–
–

•

Windows Server 2003, 2008, 2008 R2 ,2012
Active Directory
IIS 7.0 (Portal)
.NET 4 Framework

Security Architecture:
–
–
–
–

•

Portal User

Supported Databases:
–
–

•

Lima Offline

Server System:

Windows XP, Vista , 7 & 8
Full support for both 32-bit and 64-bit OS
HASP Network Client
.NET 4 framework
Web Browser

Lima Offline Client:
–
–
–

Enables Offline Closed Network Access
AES 128Bit Data Encryption
Record(Read-only) Lock

Lima Client

Lima Server
Management & Financial Control
• Accurately record time spent on each process
• Understand utilisation rates of staff on each process
• Understand asset usage by individual asset
• Extract reporting information quickly into XML or
other formats – saving time
• Quickly query all records
• Manage Contractors
Lima Module Launchpad
Lima Cases
Complete Case Management Record
Reduce time by working on ONE system
Functionality
• Log all activity on each case
• Log and track all exhibits, assets, resources used
• Comprehensive Audit Log
• Quality gateways & reviews
• Automatic Document generation
Lima Cases
Lima Resources
Know all resources used on every case
Plan and manage resources
Functionality
• Track and manage People, Software & Hardware
• Manage staff access levels / Portal access
• Manage staff password
• Calendar / Group Calendar
• Manage task allocation
Lima Contacts
Keep track of all contacts and details
Group contacts into communities
Functionality
• Easy to import internal Contacts from databases
• Update with all external client contacts
• Track all contacts through Contact log
• Understand all cases a Contact has been involved in
• Use for Mail Merge and e-Mail
Lima Portal
The Lima Customer Portal module provides:
•
•
•
•
•
•
•

Up to the minute updates via an SSL 128-Bit encrypted portal
Maximise the efficiency of the investigation
View own and group cases
Online case submission and prioritisation scoring
Approval and Budget Control Process
Re-brand to your own organisation
Low cost training solution built in

Allows investigators and clients (if desired) access to selective case
information, keeping the channel of communication between the
forensic investigator and his team or the consultant and his client open
and dynamic.
Lima Knowledge Base
• The Lima Knowledge module is a
centralised repository for information
• Move information around the knowledge
structure to maintain relevance
• Enables you to maintain a repository of
searchable indexed information
• Documents and information logically
structured into categories
Lima Search
The Lima Search module offers:
• Search for information in any of the Lima modules
• Filter results and export to XML
• Further analysis or management reporting
• Quickly locate and report on any data
• Provides auditing of assets and exhibits
Lima Support
Benefit from enhancements and fixes
Fast Response to Issues through Ticket system
Functionality
• Active updating and development programme
• Regular New Releases – extra functionality
• IntaForensics in-house development
• Advice and support from IntaForensics
• Support tickets through our Support Portal
More Information

http://www.intaforensics.com

More Related Content

What's hot

Hashicorp Vault: Open Source Secrets Management at #OPEN18
Hashicorp Vault: Open Source Secrets Management at #OPEN18Hashicorp Vault: Open Source Secrets Management at #OPEN18
Hashicorp Vault: Open Source Secrets Management at #OPEN18Kangaroot
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application ArchitectureUC San Diego
 
4 Getting Started & 5 Leads
4 Getting Started & 5 Leads4 Getting Started & 5 Leads
4 Getting Started & 5 LeadsSam Bowne
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
CNIT 129S: Ch 7: Attacking Session Management
CNIT 129S: Ch 7: Attacking Session Management CNIT 129S: Ch 7: Attacking Session Management
CNIT 129S: Ch 7: Attacking Session Management Sam Bowne
 
John the ripper & hydra password cracking tool
John the ripper & hydra password cracking toolJohn the ripper & hydra password cracking tool
John the ripper & hydra password cracking toolMd. Raquibul Hoque
 
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAPVirtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAPMichael Coates
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationJerod Brennen
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringSam Bowne
 
XXE injection - Nguyễn Tăng Hưng
XXE injection - Nguyễn Tăng HưngXXE injection - Nguyễn Tăng Hưng
XXE injection - Nguyễn Tăng HưngVõ Thái Lâm
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 

What's hot (20)

Hashicorp Vault: Open Source Secrets Management at #OPEN18
Hashicorp Vault: Open Source Secrets Management at #OPEN18Hashicorp Vault: Open Source Secrets Management at #OPEN18
Hashicorp Vault: Open Source Secrets Management at #OPEN18
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
 
Okta docs
Okta docsOkta docs
Okta docs
 
Same origin policy
Same origin policySame origin policy
Same origin policy
 
4 Getting Started & 5 Leads
4 Getting Started & 5 Leads4 Getting Started & 5 Leads
4 Getting Started & 5 Leads
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
CNIT 129S: Ch 7: Attacking Session Management
CNIT 129S: Ch 7: Attacking Session Management CNIT 129S: Ch 7: Attacking Session Management
CNIT 129S: Ch 7: Attacking Session Management
 
John the ripper & hydra password cracking tool
John the ripper & hydra password cracking toolJohn the ripper & hydra password cracking tool
John the ripper & hydra password cracking tool
 
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAPVirtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
 
Linux 101
Linux 101Linux 101
Linux 101
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and Mitigation
 
Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
 
Authentication
AuthenticationAuthentication
Authentication
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
 
XXE injection - Nguyễn Tăng Hưng
XXE injection - Nguyễn Tăng HưngXXE injection - Nguyễn Tăng Hưng
XXE injection - Nguyễn Tăng Hưng
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Similar to Lima - Digital Forensic Case Management System

The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringKimberly Simon MBA
 
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)Nordic APIs
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud ServiceForgeRock
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterForgeRock
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesTeamBreota
 
CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICEForgeRock
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Company profile
Company profileCompany profile
Company profileCDS
 
Peloton Cycle Streaming Live Spin Classes to Thousands with Loggly & AWS
Peloton Cycle  Streaming Live Spin Classes to Thousands with Loggly & AWSPeloton Cycle  Streaming Live Spin Classes to Thousands with Loggly & AWS
Peloton Cycle Streaming Live Spin Classes to Thousands with Loggly & AWSAmazon Web Services
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Sectricity
 
Content gov2014 armedia rm_acm_presentation v0 7
Content gov2014 armedia rm_acm_presentation v0 7Content gov2014 armedia rm_acm_presentation v0 7
Content gov2014 armedia rm_acm_presentation v0 7Armedia LLC
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Log monitoring and file integrity monitoring
Log monitoring and file integrity monitoringLog monitoring and file integrity monitoring
Log monitoring and file integrity monitoringControlCase
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
 

Similar to Lima - Digital Forensic Case Management System (20)

IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized Enterprises
 
CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICE
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Company profile
Company profileCompany profile
Company profile
 
Peloton Cycle Streaming Live Spin Classes to Thousands with Loggly & AWS
Peloton Cycle  Streaming Live Spin Classes to Thousands with Loggly & AWSPeloton Cycle  Streaming Live Spin Classes to Thousands with Loggly & AWS
Peloton Cycle Streaming Live Spin Classes to Thousands with Loggly & AWS
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Seamless erp
Seamless erpSeamless erp
Seamless erp
 
Content gov2014 armedia rm_acm_presentation v0 7
Content gov2014 armedia rm_acm_presentation v0 7Content gov2014 armedia rm_acm_presentation v0 7
Content gov2014 armedia rm_acm_presentation v0 7
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Log monitoring and file integrity monitoring
Log monitoring and file integrity monitoringLog monitoring and file integrity monitoring
Log monitoring and file integrity monitoring
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 

Recently uploaded

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 

Lima - Digital Forensic Case Management System

  • 1.
  • 2. The Most Effective Digital Forensics Case Management System available – an Essential Investment for any investigations team
  • 4. Lima User Community “Using Lima has given Humberside Police HTCU significant time savings and exhibit continuity. Hardware and software can be tracked to all cases they have been used on – ISO standards and forensic regulation will make this a ‘must have’ for digital forensics...” Dave Littlewood, HTCU Manager, Humberside Police, UK "Lima is the perfect addition to our current strict procedures and controls. Lima allows us to implement the accountability and auditing we need in our quest for ASCLD accreditation". ,” Lance Fogarty, CEO of PROTEGGA LLC, USA “Through the use of the Lima Forensic Case Management solution in support of our validation methodologies, we have been able to achieve the ISO 17025 accreditation standard. One of the most invaluable aspects of the Lima system has been to standardise and validate our processes and keep track of our asset validation within the organisation. Lima has streamlined our Forensic case management workflows and has been invaluable in obtaining accreditation" Geoff Boyd, Director of MD5 Group, UK
  • 7. Headline Benefits • Saves Time – all case management information in one secure system – eliminates duplication and preserves control • Enables continuity - all case staff have access all the time whether operating off-site, on-site or on shift patterns • Easy communication - Easy search and quick access to all records, with powerful case and management reporting features • Understand Utilisation – of staff, assets and on processes= enabling performance management of forensic and investigatory functions and staff • Configure – Easily configure a system yourselves without having costly amendments made by us – system grows and adapts as your needs evolve
  • 8. Meeting Standards • Supports ISO 9001 processes – Tailor to fit Standard Operating Procedures • Supports ISO/IEC 27001 – control access, security permissions and encryption of data • Supports ISO/IEC 17025 – Forensically sound methodology at the heart of the workflow • Supports ISO/IEC 27037:2012 – Information technology – Security techniques – Guidelines for identification, collection, acquisition, and preservation of digital evidence • Supports ASCLD/LAB accreditation
  • 10. Lima Network • – – – – • Lima VPN Client SQL Express 2005 built-in (up to 4GB 1000+ cases) SQL Enterprise Server Active Directory permissions Username password combination Security clearance levels AES 128Bit Encryption Lima Client Client Systems: – – – – – • Windows Server 2003, 2008, 2008 R2 ,2012 Active Directory IIS 7.0 (Portal) .NET 4 Framework Security Architecture: – – – – • Portal User Supported Databases: – – • Lima Offline Server System: Windows XP, Vista , 7 & 8 Full support for both 32-bit and 64-bit OS HASP Network Client .NET 4 framework Web Browser Lima Offline Client: – – – Enables Offline Closed Network Access AES 128Bit Data Encryption Record(Read-only) Lock Lima Client Lima Server
  • 11. Management & Financial Control • Accurately record time spent on each process • Understand utilisation rates of staff on each process • Understand asset usage by individual asset • Extract reporting information quickly into XML or other formats – saving time • Quickly query all records • Manage Contractors
  • 13. Lima Cases Complete Case Management Record Reduce time by working on ONE system Functionality • Log all activity on each case • Log and track all exhibits, assets, resources used • Comprehensive Audit Log • Quality gateways & reviews • Automatic Document generation
  • 15. Lima Resources Know all resources used on every case Plan and manage resources Functionality • Track and manage People, Software & Hardware • Manage staff access levels / Portal access • Manage staff password • Calendar / Group Calendar • Manage task allocation
  • 16. Lima Contacts Keep track of all contacts and details Group contacts into communities Functionality • Easy to import internal Contacts from databases • Update with all external client contacts • Track all contacts through Contact log • Understand all cases a Contact has been involved in • Use for Mail Merge and e-Mail
  • 17. Lima Portal The Lima Customer Portal module provides: • • • • • • • Up to the minute updates via an SSL 128-Bit encrypted portal Maximise the efficiency of the investigation View own and group cases Online case submission and prioritisation scoring Approval and Budget Control Process Re-brand to your own organisation Low cost training solution built in Allows investigators and clients (if desired) access to selective case information, keeping the channel of communication between the forensic investigator and his team or the consultant and his client open and dynamic.
  • 18. Lima Knowledge Base • The Lima Knowledge module is a centralised repository for information • Move information around the knowledge structure to maintain relevance • Enables you to maintain a repository of searchable indexed information • Documents and information logically structured into categories
  • 19. Lima Search The Lima Search module offers: • Search for information in any of the Lima modules • Filter results and export to XML • Further analysis or management reporting • Quickly locate and report on any data • Provides auditing of assets and exhibits
  • 20. Lima Support Benefit from enhancements and fixes Fast Response to Issues through Ticket system Functionality • Active updating and development programme • Regular New Releases – extra functionality • IntaForensics in-house development • Advice and support from IntaForensics • Support tickets through our Support Portal

Editor's Notes

  1. Lima – the winner of the SC Magazine 2013 Digital Forensic Tools Group Test “Best Buy” Award.In use widely throughoutLaw enforcement in the UK, USA and Canada – and starting to garner interst in Australia and South Africa