AccessData

 

Blog

 
 
E-Discovery Forensics

Forensic Data Collection in Latin America: Behind the Scenes with a Government Investigator in Colombia

By AccessData Insight

Jun 15, 2015 - June 15, 2015 In recognition of the growing challenges and opportunities associated with forensic data investigations around the world, AccessData recently hosted the first-ever “International Forensic Symposium: Trends and Current Situation” event in Washington, D.C. The event brought together forensic investigators and government officials from a number of countries in Europe and Latin America for a wide-ranging discussion of the unique challenges they encounter with their processes, technologies and operations. Bayron Prieto, Chief of the Digital Forensics Lab from the Colombian Superintendence of Industry and Commerce, was one of the featured speakers at the symposium. Prieto delivered an address – “Forensic Investigations, Experience and Success Stories” – that explored the processes, workflows, experiences and management challenges associated with forensic data collection in Colombia.

Read Article

Tags: accessdata, forensics,

 

How far we’ve come: From early manual cell examinations to JTAG/Chip Off raw data extractions

By AccessData Insight

May 26, 2015 - May 26, 2015 Mobile device examiners can utilize specific hardware to help build, program, and in some instances, even repair the device at the manufacturing level to collect the data. By utilizing sophisticated methods for data collection, and known device hardware specifications, examiners can now bypass device gesture and password locks, and even collect data from damaged or encrypted devices by accessing the flash memory chip directly. What we once thought to be only part of a CSI episode or only possible for the forensic scientist is now a reality among the mobile forensic community.

Read Article

Tags: computer-forensics, mobile, mobile-devices, mobile-forensics,

 

Gartner Report Identifies Disruptive Forces in eDiscovery

By Scott Lefton

May 26, 2015 - The first of those notable market developments, according to Gartner, was the growing usage of Microsoft Office 365. “Migration to Office 365 has set off evaluation discussions and upgrade projects on e-discovery processes and tools,” said the report. “This is a common theme: Organizations are in the process of migrating email and documents into Office 365 and need to take a step back on what that means to their established e-discovery process and technology application.”

Read Article

Tags: accessdata, e-discovery,

 

The True Essence of AccessData

By Viviana Meneses

Dec 1, 2014 - December 1, 2014 Since AccessData introduced its first forensic tool almost 20 years ago, there has been one clear objective, helping dedicated investigators working to keep dangerous people off the streets. In providing those initial forensic tools, we made a commitment to work together with you to achieve this goal. Our job as a company was to support you in this endeavor. This objective was true back then and remains true today.

Read Article

Tags: accessdata, computer-forensics, viviana-meneses,

 

A tool-box approach to mobile device investigations.

By AccessData Insight

Nov 24, 2014 - When it comes to mobile device investigations,a tool-box approach is best. This article discusses why.

Read Article

Tags: computer-forensics, forensics, mpe+,

 

Exciting Times at AccessData

By Tim Leehealey

Nov 2, 2014 - This move makes good business sense and the timing is right. Our AccessData business is as solid as ever, while our incident response business is seeing myriad market opportunities. It’s not a question of whether the sum of our business parts is greater as a whole; the reality is separating AccessData into two companies translates into improved agility and customer focus to achieve business excellence.

Read Article

Tags: computer-forensics, e-discovery, resolution1, tim-leehealey,

 

Because you know I’m all about the Case Organizer, Case Organizer, Case Organizer…

By AccessData Insight

Oct 28, 2014 - Summation’s Case Organizer capability will empower litigation teams to build their case from the ground up as they prepare for trial. It will improve your case organization, analysis and collaboration through the use of its powerful, yet simple and intuitive workflows.

Read Article

Tags: case organizer, e-discovery, summation,

 

Bring E-Discovery Hardware In-House for More Control, Flexibility and Improved Results

By AccessData Insight

Jul 9, 2014 - Today’s e-discovery software platforms are the most powerful and efficient the industry has experienced. With advanced, behind the firewall deployments, customers have the ability to deploy litigation holds, execute full or targeted collections, process 700+ data types, and perform early case assessment and final review from a single integrated solution.

Read Article

Tags: e-discovery,

 

The End of the Forensics/e-Discovery Divide

By Tim Leehealey

Apr 30, 2013 - I can’t tell you how many times I’ve heard professionals in the e-Discovery and/or forensics field talk about the extreme differences between e-Discovery and forensics. If they’re forensics experts, they talk about the bag of complex tools they have and the obscure methods they use to unearth the hidden truth on a suspect’s computer and mobile devices. If they’re e-Discovery experts, they talk about leaving the collection up to the forensics experts so they can focus on contemporary non-linear review techniques. These experts are out of touch, and often they have a vested interest in maintaining the status quo. The simple fact is the two markets are converging so rapidly that I would be amazed if the divide wasn't completely gone within the next two years.

Read Article

Tags: accessdata, computer-forensics, e-discovery, federal, forensics, ftk-products, interoperate, market-leading, mobile-devices, realtime-collaboration,

 

BYOD: Keep Your Eye on the Enterprise

By AccessData Insight

Mar 1, 2013 - The prevailing movement, labeled Consumerization of IT or Bring Your Own Device (BYOD), will continue to shift the way employees interact with enterprise applications and information, which raises considerable security challenges to any organization. These devices may include an array of tablets, including Apple® and Android™ smartphones, “Wintel” laptops, and devices we have yet to see. For some organizations, such as universities, the array of user devices may be unlimited, and therefore their grasp on securing data may be tenuous for quite some time. Other organizations will be in a better position to leverage policy to control the acceptable devices allowed and to ensure they have the ability to investigate these devices as needed.

Read Article

Tags: byod, cell-phones, computer-forensics, digital-investivations, incident-response, information-security, mobile-devices, mobile-forensics,

 

‹ First  < 4 5 6