Utah’s business landscape is rich with professionals who have le...Read More
Social Media and Employers: Friends or Enemies?
The Case for HSAs
Time to Show Up
Make a Move
In the Lab
Rent to Own
Back from the Dead
A Breath of Fresh Air
Travel & Tourism
AccessData announced the release of Forensic Toolkit (FTK ) 4. This major release is designed to give FTK users enterprise-class capabilities at a stand-alone price. A new feature called ‘Single-Node Enterprise’ gives FTK users the full analysis functionality of AD Enterprise, AccessData’s enterprise-class investigation and incident response solution. This gives organizations affordable access to more advanced incident response and remote investigative capabilities. Using FTK, computer forensics examiners are able to securely and remotely investigate a running computer to analyze and collect data from disk, volatile and RAM, eliminating travel and reducing response time. “FTK 4 gives our users access to functionality not found in any other product in this class of forensic software,” commented Brian Karney, president and COO of AccessData.
Corporations and investigators in many disciplines increasingly require the ability to investigate internal matters, such as HR policy violations, regulatory compliance and employee separation. Whether motivated by regulations or internal policy, the ability to conduct remote investigations is a requirement to address the risks of a digital workplace. FTK 4 now offers the critical components necessary to manage those risks to organizations that cannot spend tens of thousands of dollars on large-scale enterprise investigations platforms. These capabilities have never been offered in such an integrated and affordable solution.
FTK 4 also introduces two expansion modules for computer forensics examiners and malware analysts. These add-on offerings increase the breadth and depth of the FTK user experience and introduce a new paradigm for first and second responders.
Cerberus Malware Analysis
Cerberus is a malware analysis and triage technology that reduces the level of expertise required to triage suspected malware, allowing first and second responders to gain actionable intelligence on malware threats without waiting for a malware team to analyze binaries in a sandbox. The first step towards automated reverse engineering, Cerberus provides threat scores and disassembly analysis to determine the behavior and intent of suspect binaries, prior to sending them on for deeper analysis.
Visualization allows FTK users to view data in multiple display formats, including timelines, social analyzer, pie charts and more. By combining the state-of-the-art backend processing of FTK with this graphical analytic interface, FTK users will dramatically enhance the accuracy and speed with which they can analyze case data.