top of page
ISeek_Large_Metallic2.png

THE INTELLIGENT AGENT

EDISCOVERY - DIGITAL FORENSICS - MALWARE DETECTION - IT COMPLIANCE

ISEEK VIDEOS

This is a collection of videos showing different aspects of ISeekDiscovery in action.

 

Processing takes place in the background using the original data stores, but without moving any data off the endpoint. Unlike the claims of other methods, on live machines under attack or being in use, ISeekDiscovery can access ALL locked files and process them without creating yet another pile of discoverable data which would increase your IP risk.  Think of index engines since all of them either have to hold onto the original data, make a substitute copy of the originals, or store the indexes in accessible storage.

 

The tasks undertaken in these videos are impossible for your current tools.  We have them – we tried them – they didn’t work.  Watch the numbers in the videos by comparing ISeekDiscovery to your current forensic tools. In this age of COVID, you may be hundreds or even thousands of miles away from the data without any help from anyone or anything.  You can compare index-based database tools, search engines, regex engines, forensic tools, monitoring agent applications, and all the people you can find – but you still can’t beat the outcome or the clock or the autonomous nature of ISeekDiscovery’s parallel processing.  You seriously cannot beat ISeekDiscovery’s accuracy and only ISeekDiscovery allows you to do all the processing you want for no variable cost.

 

We have included some real-time movies for several use cases, the common thread being that WITHOUT ISEEKDISCOVERY THE FOLLOWING EXAMPLES ARE IMPOSSIBLE

 

EXAMPLE of EDRM processing :

 

EDRM 1 - [Runtime: 10 minutes (75 minutes compressed)] 

[update 10/01/20 – the time is now 68 minutes]

 

The only forensic automaton, ISeekDiscovery, processing a 100 gig PST file on a typical workstation PC containing 1.5 million emails and 10 million attachments.  In this example, we are searching for 5 single-word terms that any product SHOULD find if given enough time – but we have tried all the popular tools and they won’t.  

 

Can you tell your tool to capture all responsive emails into an encrypted container, send that container to any cloud storage, share or attached device? Very importantly, get an IMMEDIATELY COMMUNICATION by email with an encrypted audit report listing why each email was captured? 

 

The source file is available by NDA only. None of the email contents have been created by us. You can create a similar test file using the originally released Enron data set in multiple copies plus Office365 versions of the attachments of 1 set. 

 

EXAMPLES of IR processing:

 

Incident Response 1 - [Runtime 31 minutes]

 

The only forensic automaton, ISeekDiscovery, processing a 100 gig PST file on a typical workstation PC containing 1.5 million emails and 10 million attachments. 

 

In this example, we are searching for phishing code inside email’s and attachments which we have defined as being any file containing executable code that is misnamed.  Can you tell your tool to capture all responsive emails into an encrypted container, send that container to any cloud storage, share or attached device? Very importantly, can you get an IMMEDIATE COMMUNICATION by email with an encrypted audit report listing why each email was captured?

 

The source file is available by NDA only.

Incident Response 2 - [Runtime < 10 minutes]

 

The only forensic automaton, ISeekDiscovery, processing a 4 GB MBOX file from the public domain. 

 

In this example, ISeekDiscovery is searching for malware by checking each file in a 4 gig MBOX file of 919,000 emails to see if it contains executable code. Can ANY of your current tools, in less than 3 minutes, identify and extract emails that contain potential malware products?  

 

The data is in public space at edrm.net’s international dataset (https://edrm.net/resources/data-sets/edrm-internationalization-data-set/)  Our test file is the 23 separate mbox files, collapsed into 1 mbox along with 4 duplicate copies.  The expected outcome is 105 emails containing potential malware.  Use Virus Total to verify the findings.  Can you tell your tool to capture all responsive emails into an encrypted container, send that container to any cloud storage, share or attached device, even (potentially) in email itself?  And very importantly, can you get an IMMEDIATE COMMUNICATION by email or text with an encrypted audit report listing why each email was captured? 

 

You can create the test file,  or request a download from us using Googledrive by sending an email to source@xtremeforensics.com 

 

NOTES:  While ILookIX does have built-in antivirus, the point here is AV will simply fail outright and it does not “clear” a file, it just does not find a positive hit.  ISeekDiscovery takes a revolutionary approach by finding anomalies in the filename type conventions while the machine is alive. ISeek is only interested in anything that does not make systemic sense, not whether or not it is a bad actor.  The EDRM files noted here (see that movie section) do have malware, as do the original Enron data sets as published in the past.

bottom of page