Forensic Toolkit (FTK)®

Digital Investigations


Why You Want It

Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis speed with FTK®, the purpose-built solution that interoperates with mobile device and e-discovery technology. Powerful and proven, FTK processes and indexes data upfront, eliminating wasted time waiting for searches to execute. No matter how many different data sources you’re dealing with or the amount of data you have to cull through, FTK gets you there quicker and better than anything else.


FTK uses distributed processing and is the only forensics solution to fully leverage multi-thread/multi-core computers. While other forensics tools waste the potential of modern hardware solutions, FTK uses 100 percent of its hardware resources, helping investigators find relevant evidence faster.


Since indexing is done up front, filtering and searching are completed more efficiently than with any other solution. Whether you’re investigating or performing document review, you have a shared index file, eliminating the need to recreate or duplicate files.


FTK is truly database driven, using one shared case database. All data is stored securely and centrally, allowing your teams to use the same data. This reduces the cost and complexity of creating multiple data sets.


FTK Featured Video

Built to interoperate with mobile and e-discovery solutions, FTK helps you find relevant evidence faster, dramatically increase analysis speed and reduce backlog. It's the only solution that utilizes a single case database, creating a clear picture of the event.

Features Built Around You

Capabilities To Empower You

  • Third party integration with Belkasoft gives you access to nearly 200 mobile parsers.
  • Unique distributed processing, which cuts processing time and reduces case backlog.
  • Custom processing options help establish enterprise-wide processing standards, creating consistency for your investigations and reducing the possibility of missed data.
  • FTK processes and indexes up front so you don’t waste time waiting for searches to execute, helping you to zero in on relevant evidence faster, and dramatically increasing analysis speed.
  • Configure and change the weighting criteria for sort after a search to reveal the most relevant results.
  • Leverages one shared case database, allowing teams to use the same data, reducing cost and complexity of creating multiple case datasets.
  • While other products run out of memory and crash during processing, FTK is database driven, providing the stability necessary to handle large data.
  • The easy-to-use GUI provides a faster learning experience.
  • Visualization technology that displays your data in timelines, cluster graphs, pie charts, geolocation and more, helps you get a clearer picture of events.
  • Customizable processing profile buttons help create a set of standards for processing particular types of investigations.


AccessData has developed other industry-leading solutions to assist in password recovery. These solutions are used in many different environments to provide specific, password-cracking related functions. Law enforcement and corporate security professionals performing computer forensic investigations, utilize these solutions to access password-protected files. Likewise, administrators can also utilize these solutions to recover system passwords, lost personal passwords and more. AccessData’s Password Recovery Toolkit® (PRTK®) and Distributed Network Attack® (DNA®) provide access to passwords for a large number of popular software applications. PRTK runs on a single machine only. DNA uses multiple machines across the network or across the world to conduct key space and dictionary attacks.

Rainbow (Hash) Tables

Rainbow Tables are pre-computed, brute-force attacks. In cryptography, a brute-force attack is an attempt to recover a cryptographic key or password by trying every possible key combination until the correct one is found. How quickly this can be done depends on the size of the key, and the computing resources applied. A system set at 40-bit encryption has one trillion keys available. A brute-force attack of 500,000 keys per second would take approximately 25 days to exhaust the key space combinations using a single 3 GHz Pentium 4 computer. With a Rainbow Table, because all possible keys in the 40-bit keyspace are already calculated, file keys are found in a matter of seconds to minutes; far faster than by other means. DNA and PRTK seamlessly integrate with Rainbow Tables.

Portable Office Rainbow Tables (PORT)

AccessData Portable Office Rainbow Tables (PORT) are different from the full Hash tables set. A statistical analysis is done on the file itself to determine the available keys. This takes far less space than the Hash Tables, but also takes somewhat more time and costs a small percentage in accuracy.

Let’s Get Started

FTK leverages multi-machine processing capabilities, cutting case processing times more than 400% vs. leading competitors, reducing case backlog significantly; it performs comprehensive processing upfront greatly increasing the speed with which an examiner can focus on the actual investigation.

What Clients Are Saying


  • Jump over to Resources for additional product brochures, case studies, white papers, as well as on-demand videos and more.RESOURCES
  • View our library of on-demand video tutorials.VIEW TUTORIALS



Deeper Insights from Dynamic Investigations

AD Lab

Large-Scale Investigation and Processing

Belkasoft Evidence Center

Comprehensive Toolkit for Acquiring and Analyzing Digital Evidence


Proactively identify compromised systems

AD Triage

On-scene Computer Collection

Mobile Solutions

MPE+® and nFIELD™


Our Professional Services team can work with any size organization to provide scalable support for short- or long-term initiatives, based on your needs.

Contact us today to learn more about our products and our
approach to improving how you collect, analyze and use data.
Tell Me More