Helping You Take a Deeper Dive into What Matters
From white papers on everything from collection to e-discovery and customer case studies that highlight real-world examples of impact and improvement, we’ve created a library of content that will help you be more effective.
Case Studies
Product: AD eDiscovery, AD Enterprise
How a global cosmetics company keeps its beauty secrets safe with AccessData tools
The $500+ billion global beauty industry is fiercely competitive. Consumers expect innovation and proven results to stay brand-loyal, forcing manufacturers to protect their intellectual property, especially from breaches by internal personnel. Read how one IT Security team protects and investigates over 40,000 endpoints worldwide using AD Enterprise and AD eDiscovery to remotely collect data in a forensically sound manner.

Infographics
Product: AccessData API, AD Enterprise
Infographic: Cybersecurity Guide
Each year, hundreds of businesses and millions of individuals are impacted by a data breach. Even the best cyber security defense and detection software cannot prevent 100 percent of attacks. Download our Cybersecurity Guide to find out what to do when the inevitable happens.
Brochures
Product: AD Enterprise
AD Enterprise 7.4
AD Enterprise 7.4 features the ability to collect, analyze and compare volatile data from the latest Windows OS, including Windows 10. Other features include faster Mac agent collection, QView integration, facial and image detection, UFDR processing improvements and portable case enhancements.

Videos
Product: AD Enterprise
Remote Mac Collection with Enterprise 7.3
When you need remote and covert collection from Mac operating systems, AD Enterprise 7.3 is the only tool on the market with the ability to mass deploy a remote Mac agent, without any manual intervention by the endpoint user. New integration with Jamf® deployment provides greater visibility into activity on all endpoints, network shares and peripheral devices, even those running on macOS® Catalina or Mojave.

Brochures
Product: AD Enterprise
Expand your digital collection capabilities to every endpoint with AD Enterprise 7.3
Whether you’re investigating a data breach, employee misconduct, or potential IT policy violation, you need to covertly access multiple operating systems and encrypted endpoints, without alerting employees or disrupting business operations. Only AD Enterprise 7.3 supports the mass deployment of remote Mac agents to expand your forensic collection capabilities to endpoints running on a macOS operating system, up to macOS 10.15 (Catalina). Our integration with Jamf® remote agent deployment eliminates the need for manual intervention, allowing the user to covertly preview and search live data at the Mac endpoint, before initiating a targeted collection.
Product: AD eDiscovery, AD Enterprise
How a global cosmetics company keeps its beauty secrets safe with AccessData tools
The $500+ billion global beauty industry is fiercely competitive. Consumers expect innovation and proven results to stay brand-loyal, forcing manufacturers to protect their intellectual property, especially from breaches by internal personnel. Read how one IT Security team protects and investigates over 40,000 endpoints worldwide using AD Enterprise and AD eDiscovery to remotely collect data in a forensically sound manner.

Product: AD Enterprise
Post Breach Forensics Experts
The volume and severity of data breaches have grown tremendously with the increase in a number of businesses going digital. Cyber-attacks happen with lightning speed, resulting in data loss and data exposure that leave a myriad of organizations with ruined brand reputation, loss of customer trust, and business discontinuity.
Product: AD Enterprise
Legal Team’s Role in Investigating and Responding to a Data Breach
Co-authored by Elizabeth Rogers, Partner at Michael Best, and Melissa Singleton from AccessData, this white paper outlines the critical role of in-house legal in helping organizations effectively collaborate to manage post-breach investigations and minimize the damage―from the initial identification and investigation, through reporting findings and learning from the incident.

Product: AD eDiscovery, AD Enterprise
The State of Digital Investigations: Preparing for Tomorrow
When planning future investments in an enterprise-wide digital investigation solution, CIOs should look for a solution that can help simplify the investigation workflow, improve staff efficiency, and reduce data movement between platforms and teams.

Product: AD Enterprise
For Internal Investigations, Technology Is Playing Catch-Up With Technology
In an interview with Metropolitan Corporate Counsel, AccessData Senior Sales Engineer Scott Lefton discusses the changing landscape of internal investigations and the need for companies to be more aware of the biggest threat to their data today –their own employees.

Product: AD eDiscovery, AD Enterprise
A CIO & CISO Guide to Digital Discovery Technology Planning
As the growth of digital information continues to mount, so do the challenges facing CIO’s and IT professionals tasked with managing and protecting that data. To help keep you informed of the challenge facing today’s corporations, and arm you with the information and tools needed to help you prepare, AccessData has developed the CIO & CISO Guide to Digital Discovery Technology Planning.

Product: AD Enterprise
Remote Mac Collection with Enterprise 7.3
When you need remote and covert collection from Mac operating systems, AD Enterprise 7.3 is the only tool on the market with the ability to mass deploy a remote Mac agent, without any manual intervention by the endpoint user. New integration with Jamf® deployment provides greater visibility into activity on all endpoints, network shares and peripheral devices, even those running on macOS® Catalina or Mojave.

Product: AD Enterprise
AD Enterprise: Network Investigation & Incident Response
From multiple office locations to massive employee pools and remote workers, AD Enterprise provides deep visibility into your organization’s data, to uncover employee wrongdoing and facilitate regulatory and legal requirements quickly and covertly.

Product: AD eDiscovery, AD Enterprise
Managing Data Risk and Compliance
Compliance is one of the top investigations corporations conduct on a weekly basis. Yet, ensuring compliance is challenging when data is located across various endpoints on your network. How can your organization get ahead of the challenges and efficiently and effectively manage risk?
Product: AD Enterprise
AD Enterprise 7.4
AD Enterprise 7.4 features the ability to collect, analyze and compare volatile data from the latest Windows OS, including Windows 10. Other features include faster Mac agent collection, QView integration, facial and image detection, UFDR processing improvements and portable case enhancements.

Product: AD Enterprise
Expand your digital collection capabilities to every endpoint with AD Enterprise 7.3
Whether you’re investigating a data breach, employee misconduct, or potential IT policy violation, you need to covertly access multiple operating systems and encrypted endpoints, without alerting employees or disrupting business operations. Only AD Enterprise 7.3 supports the mass deployment of remote Mac agents to expand your forensic collection capabilities to endpoints running on a macOS operating system, up to macOS 10.15 (Catalina). Our integration with Jamf® remote agent deployment eliminates the need for manual intervention, allowing the user to covertly preview and search live data at the Mac endpoint, before initiating a targeted collection.

Product: AD Enterprise
A Review of AD Enterprise as Published by Forensic Focus
Download a review of AD Enterprise, as published in Forensic Focus. Jade James reviews the product's key features, including the ability to preview live data; filtering and targeting options for those who only want to retrieve data that is pertinent; the ability to conduct live memory analysis to find traces of malware; and identification and removal of unapproved process by wiping or killing remotely.

Product: AD Enterprise
AD Enterprise 7.1
Automate cyber workflows for rapid root-cause investigations

Product: AccessData API, AD Enterprise, AD Lab, Quin-C
Accelerate Incident Response with New API
Automate forensic collection from the first moments an incident is detected.
Product: AD Enterprise
AD Enterprise 7.4
AD Enterprise 7.4 features the ability to collect, analyze and compare volatile data from the latest Windows OS, including Windows 10. Other features include faster Mac agent collection, QView integration, facial and image detection, UFDR processing improvements and portable case enhancements.

Product: AD Enterprise
Expand your digital collection capabilities to every endpoint with AD Enterprise 7.3
Whether you’re investigating a data breach, employee misconduct, or potential IT policy violation, you need to covertly access multiple operating systems and encrypted endpoints, without alerting employees or disrupting business operations. Only AD Enterprise 7.3 supports the mass deployment of remote Mac agents to expand your forensic collection capabilities to endpoints running on a macOS operating system, up to macOS 10.15 (Catalina). Our integration with Jamf® remote agent deployment eliminates the need for manual intervention, allowing the user to covertly preview and search live data at the Mac endpoint, before initiating a targeted collection.

Product: AD Enterprise
A Review of AD Enterprise as Published by Forensic Focus
Download a review of AD Enterprise, as published in Forensic Focus. Jade James reviews the product's key features, including the ability to preview live data; filtering and targeting options for those who only want to retrieve data that is pertinent; the ability to conduct live memory analysis to find traces of malware; and identification and removal of unapproved process by wiping or killing remotely.

Product: AD Enterprise
AD Enterprise 7.1
Automate cyber workflows for rapid root-cause investigations

Product: AccessData API, AD Enterprise, AD Lab, Quin-C
Accelerate Incident Response with New API
Automate forensic collection from the first moments an incident is detected.

Product: AD eDiscovery, AD Enterprise, Forensic Toolkit (FTK)
CIO & CISO Guide

Product: AccessData API, AD Enterprise
Infographic: Cybersecurity Guide
Each year, hundreds of businesses and millions of individuals are impacted by a data breach. Even the best cyber security defense and detection software cannot prevent 100 percent of attacks. Download our Cybersecurity Guide to find out what to do when the inevitable happens.

Product: AD eDiscovery, AD Enterprise
Investigation Infographic
It’s your investigation. What’s your solution? How to determine what you need to crack your case.