[vc_row][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][mk_fancy_title tag_name=”h1″ color_style=”gradient_color” grandient_color_from=”#e5272f” grandient_color_to=”#1375ba” grandient_color_angle=”diagonal_left_top” size=”” font_weight=”bold” letter_spacing=”1″ margin_top=”50″ font_family=”none” align=”center” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]FINDING, ANALYSING AND EVALUATING DIGITAL EVIDENCE[/mk_fancy_title][vc_column_text css=”.vc_custom_1556397471400{margin-bottom: 0px !important;}”]

The field of Computer forensics can extract and analyze evidence from digital devices. Our laboratory has a wide range of technical equipment and expertise for conducting a deep analysis of computer used by suspects. In accordance with the CFE certification, our fraud investigation experts have acquired a broad knowledge of the different ways corporate crime and fraud in the government occurs. We operate our examinations following the international standards of ACFE, ISO 27035-27042 and other accepted methodologies.

[/vc_column_text][vc_empty_space height=”40″][ultimate_modal btn_size=”lg” btn_bg_color=”#ffffff” btn_bg_hover_color=”#386aac” btn_text=”Read More” modal_size=”container” modal_style=”overlay-show-genie” overlay_bg_opacity=”80″ img_size=”80″ btn_txt_color=”#386aac”]

Our forensic teams are focused on locating evidence and case relevant information, whilst keeping a low profile when visiting the premises of our clients. Our objective is to not alert possible suspects and supportive criminals. When dealing with industrial espionage an operative might still be inside the organization continuing his activities, therefore finding the person is easier if we do not enter the company like a SWAT team.

[/ultimate_modal][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css=”.vc_custom_1558536185224{margin-bottom: 0px !important;}”]

WHAT WE CAN DO TO HELP YOU:

  • Consulting clients on how to best perform the forensic investigation
  • Document the computer network infrastructure
  • Identification of relevant people and filtering out the relevant time frames
  • Identification of relevant data sources and version whilst locating the systems holding this data
    • Mobile device forensics: mobile devices, Smartphones, cell phones, gps Navigation systems, SIM cards
    • Mail forensics: Mailbox files und Mail server
    • Database forensics: database server, database files (MS SQL, MySQL, Oracle, dBase, XML, …)
    • Server forensics: file server, application server, …
    • Client forensics: Notebooks, NetBooks, Desktops, Workstations, Thinclients
    • Memory card forensics: SD, SDHC, SDXY, CF, microSD, xD, ufs cards, …
    • Flash device forensics: USB flash drives, USB Pen Drives, USB flash cards
    • Hard drive forensics: securing evidence out of hard drives, SSD and external hard drives
    • Optical Storage forensics: DVDs, CDs, etc.
    • Memory forensics: securing evidence out of current memory (RAM) or related temporary files (Pagefile)
    • Backup forensics:  Extracting data out of backup systems and devices (tapes, zip discs, …)
    • Cloud forensics: collecting evidence from online services (e.g. Dropbox, Facebook, …) or virtuall machines inside a Cloud Server
    • Netzwork forensics: Scanning, tracing and shadow copying of data communication to find attack related evidence
    • Forensic analysis of other IT Systems when needed (e.g. Copiers, Fax, Network printers, routers, CCTV, …)
    • App Forensics: investigating, finding traces and usage history relating to smartphone apps (ByLock, Eagle, Line,Signal, Telegraph, Threema, WhatsApp,WeChat, etc.)
  • Developing of emergency plans and backup concepts
  • Advising and assisting in creating lists of devices and systems that have to be provided for a fraud investigation
  • On request of courts and security services we can also conduct evidence location and securing to maintain chain of custody
  • IT forensic backups of relevant digital evidence
  • Evidence management: Documentation of the chain of custody related processes and steps
  • Providing forensic laboratory reports and Expert Analysis papers on forensic investigations

[/vc_column_text][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” bg_type=”grad” css=”.vc_custom_1552599167136{padding-top: 50px !important;padding-bottom: 40px !important;}” bg_grad=”background: url(data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjxkZWZzPjxsaW5lYXJHcmFkaWVudCBpZD0iZ3JhZGllbnQiIHgxPSIwJSIgeTE9IjAlIiB4Mj0iMCUiIHkyPSIxMDAlIj48c3RvcCBvZmZzZXQ9IjAlIiBzdHlsZT0ic3RvcC1jb2xvcjojRTUyNzMwOyIgLz48c3RvcCBvZmZzZXQ9IjEwMCUiIHN0eWxlPSJzdG9wLWNvbG9yOiMxMzc0QkE7IiAvPjwvbGluZWFyR3JhZGllbnQ+PC9kZWZzPjxyZWN0IGZpbGw9InVybCgjZ3JhZGllbnQpIiBoZWlnaHQ9IjEwMCUiIHdpZHRoPSIxMDAlIiAvPjwvc3ZnPg==);background: -webkit-gradient(linear, left top, left bottom, color-stop(0%, #E52730), color-stop(100%, #1374BA));background: -moz-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -webkit-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -o-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -ms-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: linear-gradient(100deg,#E52730 0%,#1374BA 100%);”][vc_column width=”2/3″][vc_column_text css=”.vc_custom_1556930287100{margin-bottom: 0px !important;}”]

Analiz ve fiyat teklifi için bize ulaşın

Dijital araştırmacı ekibimizden anında 7/24 yardım sunuyoruz.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_btn title=”Talep oluştur” style=”3d” color=”black” align=”center” button_block=”true” link=”url:https%3A%2F%2Fnew.acato.org%2Ftr%2Fcreate-case-tr%2F|title:Create%20Case|target:%20_blank|”][vc_column_text css=”.vc_custom_1552600497951{margin-bottom: 0px !important;}”]

CALL: +49 89 – 54041070

[/vc_column_text][/vc_column][/vc_row]