© Copyright 2019 XtremeForensics

Tomorrow's Technology Today

DIGITAL FORENSICS - EDISCOVERY - MALWARE DETECTION - CORPORATE GOVERNANCE

 

THE INTELLIGENT AGENT

EDISCOVERY - DIGITAL FORENSICS - MALWARE DETECTION - IT COMPLIANCE

Unlike 'dumb' agents used to create indexes, the ISEEK Intelligent Agent can be deployed across networks in minutes to run independently on each system for extremely fast results. By creating its own virtual machine in memory,  ISEEK can perform a range of tasks, from identifying malware in an email attachment to collecting Windows Registry Hives from running machines. ISEEK's literal string search and raw disk-reading capabilities means it does not rely on the operating system or installed applications to locate artifacts meeting the search criteria, regardless of the language used or their complexity.

Nothing to install

Fast, parallel processing

Superior to index-based approaches

1/3
 

Simple and innovative

Enhanced processing capabilities

Runs in virtual environments on standard hardware

INNOVATION IN PRACTICE

DIGITAL FORENSICS 

ILOOKix has been designed to deliver the processing resources to meet the demands of today's complex environment. The tool takes a unique approach to processing filesystems which enables it to locate folder structures, artifacts and their associated metadata which are invisible to tools that simply rely on being able to read partition tables or the 'salvage' approach.

Based around MS SQL Server, ILOOKix has the capacity to handle massive cases without 'freezing' or slowing down, even when being run in a virtual environment and on standard hardware.

Volume shadow copies are automatically processed and added to the folder tree while Windows Registry Hives and associated artifacts are rendered on their own tab.

ILOOKix is unique in being able to recover deleted files from volume shadow copies and even Ext3 and Ext4 filesystems.

ILOOKix's capacity to automatically deconstruct any SQLite database (which it converts and displays as a spreadsheet) and numerous other file types is done to present the data in the easiest form for review by the practitioner.

DISTRIBUTED FORENSICS

EDISCOVERY

MALWARE DETECTION

CORPORATE GOVERNANCE

FORENSIC ANALYSIS