Knowledge Library

Top

Helping You Take a Deeper Dive into What Matters

From white papers on everything from collection to e-discovery and customer case studies that highlight real-world examples of impact and improvement, we’ve created a library of content that will help you be more effective.

Videos

Product: AD Enterprise

Remote Mac Collection with Enterprise 7.3

When you need remote and covert collection from Mac operating systems, AD Enterprise 7.3 is the only tool on the market with the ability to mass deploy a remote Mac agent, without any manual intervention by the endpoint user. New integration with Jamf® deployment provides greater visibility into activity on all endpoints, network shares and peripheral devices, even those running on macOS® Catalina or Mojave.

Brochures

Product: AD Enterprise

Expand your digital collection capabilities to every endpoint with AD Enterprise 7.3

Whether you’re investigating a data breach, employee misconduct, or potential IT policy violation, you need to covertly access multiple operating systems and encrypted endpoints, without alerting employees or disrupting business operations. Only AD Enterprise 7.3 supports the mass deployment of remote Mac agents to expand your forensic collection capabilities to endpoints running on a macOS operating system, up to macOS 10.15 (Catalina). Our integration with Jamf® remote agent deployment eliminates the need for manual intervention, allowing the user to covertly preview and search live data at the Mac endpoint, before initiating a targeted collection.

Brochures

Product: AD Enterprise

A Review of AD Enterprise as Published by Forensic Focus

Download a review of AD Enterprise, as published in Forensic Focus. Jade James reviews the product's key features, including the ability to preview live data; filtering and targeting options for those who only want to retrieve data that is pertinent; the ability to conduct live memory analysis to find traces of malware; and identification and removal of unapproved process by wiping or killing remotely.

Infographics

Product: AccessData API, AD Enterprise

Infographic: Cyber Security Guide

Each year, hundreds of businesses and millions of individuals are impacted by a data breach. Even the best cyber security defense and detection software cannot prevent 100 percent of attacks. Download our Cyber Security Guide to find out what to do when the inevitable happens.

Brochures

Product: AD Enterprise

AD Enterprise 7.1

Automate cyber workflows for rapid root-cause investigations

No results. View all

Product: AD Enterprise

Post Breach Forensics Experts

The volume and severity of data breaches have grown tremendously with the increase in a number of businesses going digital. Cyber-attacks happen with lightning speed, resulting in data loss and data exposure that leave a myriad of organizations with ruined brand reputation, loss of customer trust, and business discontinuity.

Product: AD Enterprise

Legal Team’s Role in Investigating and Responding to a Data Breach

Co-authored by Elizabeth Rogers, Partner at Michael Best, and Melissa Singleton from AccessData, this white paper outlines the critical role of in-house legal in helping organizations effectively collaborate to manage post-breach investigations and minimize the damage―from the initial identification and investigation, through reporting findings and learning from the incident.

Product: AD eDiscovery, AD Enterprise

The State of Digital Investigations: Preparing for Tomorrow

When planning future investments in an enterprise-wide digital investigation solution, CIOs should look for a solution that can help simplify the investigation workflow, improve staff efficiency, and reduce data movement between platforms and teams.

Product: AD Enterprise

For Internal Investigations, Technology Is Playing Catch-Up With Technology

In an interview with Metropolitan Corporate Counsel, AccessData Senior Sales Engineer Scott Lefton discusses the changing landscape of internal investigations and the need for companies to be more aware of the biggest threat to their data today –their own employees.

Product: AD eDiscovery, AD Enterprise

A CIO & CISO Guide to Digital Discovery Technology Planning

As the growth of digital information continues to mount, so do the challenges facing CIO’s and IT professionals tasked with managing and protecting that data. To help keep you informed of the challenge facing today’s corporations, and arm you with the information and tools needed to help you prepare, AccessData has developed the CIO & CISO Guide to Digital Discovery Technology Planning.

Product: AD Enterprise

Remote Mac Collection with Enterprise 7.3

When you need remote and covert collection from Mac operating systems, AD Enterprise 7.3 is the only tool on the market with the ability to mass deploy a remote Mac agent, without any manual intervention by the endpoint user. New integration with Jamf® deployment provides greater visibility into activity on all endpoints, network shares and peripheral devices, even those running on macOS® Catalina or Mojave.

Product: AD Enterprise

AD Enterprise: Network Investigation & Incident Response

From multiple office locations to massive employee pools and remote workers, AD Enterprise provides deep visibility into your organization’s data, to uncover employee wrongdoing and facilitate regulatory and legal requirements quickly and covertly.

Product: AD eDiscovery, AD Enterprise

Managing Data Risk and Compliance

Compliance is one of the top investigations corporations conduct on a weekly basis. Yet, ensuring compliance is challenging when data is located across various endpoints on your network. How can your organization get ahead of the challenges and efficiently and effectively manage risk?

Product: AD Enterprise

Expand your digital collection capabilities to every endpoint with AD Enterprise 7.3

Whether you’re investigating a data breach, employee misconduct, or potential IT policy violation, you need to covertly access multiple operating systems and encrypted endpoints, without alerting employees or disrupting business operations. Only AD Enterprise 7.3 supports the mass deployment of remote Mac agents to expand your forensic collection capabilities to endpoints running on a macOS operating system, up to macOS 10.15 (Catalina). Our integration with Jamf® remote agent deployment eliminates the need for manual intervention, allowing the user to covertly preview and search live data at the Mac endpoint, before initiating a targeted collection.

Product: AD Enterprise

A Review of AD Enterprise as Published by Forensic Focus

Download a review of AD Enterprise, as published in Forensic Focus. Jade James reviews the product's key features, including the ability to preview live data; filtering and targeting options for those who only want to retrieve data that is pertinent; the ability to conduct live memory analysis to find traces of malware; and identification and removal of unapproved process by wiping or killing remotely.

Product: AD Enterprise

AD Enterprise 7.1

Automate cyber workflows for rapid root-cause investigations

Product: AccessData API, AD Enterprise, AD Lab, Quin-C

Accelerate Incident Response with New API

Automate forensic collection from the first moments an incident is detected.

Product: AD Enterprise

Manage Internal Forensic Investigations Across the Enterprise

From multiple office locations to massive employee pools and remote workers, AD Enterprise provides deep visibility into your organization’s data, to uncover employee wrongdoing and facilitate regulatory and legal requirements.

Product: AD Enterprise

Expand your digital collection capabilities to every endpoint with AD Enterprise 7.3

Whether you’re investigating a data breach, employee misconduct, or potential IT policy violation, you need to covertly access multiple operating systems and encrypted endpoints, without alerting employees or disrupting business operations. Only AD Enterprise 7.3 supports the mass deployment of remote Mac agents to expand your forensic collection capabilities to endpoints running on a macOS operating system, up to macOS 10.15 (Catalina). Our integration with Jamf® remote agent deployment eliminates the need for manual intervention, allowing the user to covertly preview and search live data at the Mac endpoint, before initiating a targeted collection.

Product: AD Enterprise

A Review of AD Enterprise as Published by Forensic Focus

Download a review of AD Enterprise, as published in Forensic Focus. Jade James reviews the product's key features, including the ability to preview live data; filtering and targeting options for those who only want to retrieve data that is pertinent; the ability to conduct live memory analysis to find traces of malware; and identification and removal of unapproved process by wiping or killing remotely.

Product: AD Enterprise

AD Enterprise 7.1

Automate cyber workflows for rapid root-cause investigations

Product: AccessData API, AD Enterprise, AD Lab, Quin-C

Accelerate Incident Response with New API

Automate forensic collection from the first moments an incident is detected.

Product: AD Enterprise

Manage Internal Forensic Investigations Across the Enterprise

From multiple office locations to massive employee pools and remote workers, AD Enterprise provides deep visibility into your organization’s data, to uncover employee wrongdoing and facilitate regulatory and legal requirements.

Product: AD eDiscovery, AD Enterprise, Forensic Toolkit (FTK)

CIO & CISO Guide

Digital Discovery Technology Planning

Product: AccessData API, AD Enterprise

Infographic: Cyber Security Guide

Each year, hundreds of businesses and millions of individuals are impacted by a data breach. Even the best cyber security defense and detection software cannot prevent 100 percent of attacks. Download our Cyber Security Guide to find out what to do when the inevitable happens.

Product: AD eDiscovery, AD Enterprise

Investigation Infographic

It’s your investigation. What’s your solution? How to determine what you need to crack your case.

Contact us today to learn more about our products and our
approach to improving how you collect, analyze and use data.
Tell Me More