access data

11
AccessData Detect Remediate Preserve Analyze Identify

Post on 19-Oct-2014

871 views

Category:

Technology


5 download

DESCRIPTION

COmo construir uma plataforma investigativa com as soluções da AccessData, comercializadas no Brasil pela TechBiz Forense Digital.

TRANSCRIPT

Page 1: Access data

AccessData

Detect

Remediate

Preserve

Analyze

Identify

Page 2: Access data

• Founded 1987• Based in Lindon, Utah• Roots in password recovery and code

breaking• Best known for Forensic Toolkit® (FTK™)

– Most user-friendly interface– Tool of choice for email analysis– Court-validated digital investigative solution used

worldwide

• 100,000+ Clients• Train more than 6,000 individuals annually

Page 3: Access data

• Data sets are increasing exponentially• Organizations policies and procedures aren’t

adapting to the change• Evidence is located in many different locations• Criminals are organized and technically savvy • Encryption is prevalent at the disk & file level• Investigators need to collaborate• Non experts need access to case data • Automation is necessary to reduce the overall

time of investigations and backlog

Page 4: Access data
Page 5: Access data

• FBI• Secret Service• IRS• Brazilian Federal Police• Mexico PGR• Portuguese Judicial Police• FEMSA• Schlumberger• Exxon• BP• EDS• 5th 3rd Bank• State Street Bank• Morgan Stanley• Barclays

Page 6: Access data

AD Enterprise: FunctionalityAD Enterprise: Functionality

Management Server

Agents on Target Workstations /Servers

ExaminerWorkstation

Page 7: Access data

AccessData Lab: FunctionalityAccessData Lab: Functionality

Investigator Analyst Reviewer Legal/HR

Centralized Database Infrastructure

Distributed ProcessingWorkers

Evidence

Web ServicesGUI

Page 8: Access data

SilentRunner Sentinel: FunctionalitySilentRunner Sentinel: Functionality

Network A Network B Network C

Collectors

Loader

Database

Analyst Workstation

Page 9: Access data

VisualizationVisualizationVisual analysis of network data from internal and external networks in order to obtain total insight (visibility) into the network.

Incident Response, Root Cause Analysis, Forensic Analysis, Log Analysis,Incident Response, Root Cause Analysis, Forensic Analysis, Log Analysis,

Policy Verification / Enforcement, Network Planning Policy Verification / Enforcement, Network Planning

Traffic Analysis Knowledge

BaseData Manager

Metadata & Content Analysis

Post Event Post EventReal Time

Page 10: Access data

AD eDiscovery: FunctionalityAD eDiscovery: Functionality

eDiscManager

Authentication & Orchestration

Services

CustodianWorkstations /Servers

Collection Services

Processing Service

Web Services

Administrator Paralegal

Structured DataEmail

Servers \ Archives

DesiredOutput

Page 11: Access data

AccessData