Access data


Published on

COmo construir uma plataforma investigativa com as soluções da AccessData, comercializadas no Brasil pela TechBiz Forense Digital.

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • All of our technology is based around our forensically sound capture methodology that is represented in the green box. You are required to have physical access to a machine in order to leverage this technology. This is being utilized by most local and federal law enforcement agencies as well as thousands of corporations for tactical employee investigations. The focus of this meeting is centered on the blue and orange boxes which represent our eDiscovery and Enterprise technologies. Enterprise was created to give our clients the ability to conduct computer investigations across the network without having to seize the employees computer, while our eDiscovery product was developed to help automate the process of collecting large amounts of data from numerous systems (structured/unstructured) simultaneously, then giving you the ability to further process/index that data conduct first pass review and determine your final production format of choice. Our over all goal is to help our clients bring these processes in house and break the dependency on outsourcing these types of functions. In the US we see the average cost per custodian (individual who owns the data/machines) being around $20,000 USD just to collect and process the data, that doesn’t include the final attorney review which usually costs $300/hr.
  • Access data

    1. 1. AccessData Detect Remediate Preserve Analyze Identify
    2. 2. <ul><li>Founded 1987 </li></ul><ul><li>Based in Lindon, Utah </li></ul><ul><li>Roots in password recovery and code breaking </li></ul><ul><li>Best known for Forensic Toolkit ® (FTK™) </li></ul><ul><ul><li>Most user-friendly interface </li></ul></ul><ul><ul><li>Tool of choice for email analysis </li></ul></ul><ul><ul><li>Court-validated digital investigative solution used worldwide </li></ul></ul><ul><li>100,000+ Clients </li></ul><ul><li>Train more than 6,000 individuals annually </li></ul>
    3. 3. <ul><li>Data sets are increasing exponentially </li></ul><ul><li>Organizations policies and procedures aren’t adapting to the change </li></ul><ul><li>Evidence is located in many different locations </li></ul><ul><li>Criminals are organized and technically savvy </li></ul><ul><li>Encryption is prevalent at the disk & file level </li></ul><ul><li>Investigators need to collaborate </li></ul><ul><li>Non experts need access to case data </li></ul><ul><li>Automation is necessary to reduce the overall time of investigations and backlog </li></ul>
    4. 5. <ul><li>FBI </li></ul><ul><li>Secret Service </li></ul><ul><li>IRS </li></ul><ul><li>Brazilian Federal Police </li></ul><ul><li>Mexico PGR </li></ul><ul><li>Portuguese Judicial Police </li></ul><ul><li>FEMSA </li></ul><ul><li>Schlumberger </li></ul><ul><li>Exxon </li></ul><ul><li>BP </li></ul><ul><li>EDS </li></ul><ul><li>5 th 3 rd Bank </li></ul><ul><li>State Street Bank </li></ul><ul><li>Morgan Stanley </li></ul><ul><li>Barclays </li></ul>
    5. 6. AD Enterprise: Functionality Management Server Agents on Target Workstations /Servers Examiner Workstation
    6. 7. AccessData Lab: Functionality Investigator Analyst Reviewer Legal/HR Centralized Database Infrastructure Distributed Processing Workers Evidence Web Services GUI
    7. 8. SilentRunner Sentinel: Functionality Network A Network B Network C Collectors Loader Database Analyst Workstation
    8. 9. Visualization <ul><li>Visual analysis of network data from internal and external networks in order to obtain total insight (visibility) into the network. </li></ul><ul><ul><li>Incident Response, Root Cause Analysis, Forensic Analysis, Log Analysis, </li></ul></ul><ul><ul><li>Policy Verification / Enforcement, Network Planning </li></ul></ul>Data Manager Metadata & Content Analysis Post Event Post Event Real Time Traffic Analysis Knowledge Base
    9. 10. AD eDiscovery: Functionality eDiscManager Authentication & Orchestration Services Custodian Workstations /Servers Collection Services Processing Service Web Services Administrator Paralegal Structured Data Email Servers Archives Desired Output
    10. 11. AccessData