{"id":308,"date":"2015-07-17T12:11:20","date_gmt":"2015-07-17T12:11:20","guid":{"rendered":"http:\/\/disklabs.com\/blog\/?p=217"},"modified":"2015-07-17T12:11:20","modified_gmt":"2015-07-17T12:11:20","slug":"remote-computer-forensics","status":"publish","type":"post","link":"https:\/\/www.disklabs.com\/remote-computer-forensics\/","title":{"rendered":"Remote Computer Forensics"},"content":{"rendered":"<h3>Supporting the IT Department<\/h3>\n<p><a href=\"http:\/\/disklabs.com\/blog\/wp-content\/uploads\/2015\/11\/XRY-with-Cables-and-Laptop-600.jpg\"><img loading=\"lazy\" class=\"alignright wp-image-218\" src=\"http:\/\/disklabs.com\/blog\/wp-content\/uploads\/2015\/11\/XRY-with-Cables-and-Laptop-600.jpg\" alt=\"remote computer forensics\" width=\"450\" height=\"325\" align=\"right\" \/><\/a>We live in an increasingly litigious world where companies can easily find themselves in the middle of legal action. Increasing corporate legislation means that considerable amounts of data must be made available usually from digital storage. Other cases including employee misconduct require a computer forensic response, including the \u00e2\u20ac\u02dcimaging\u00e2\u20ac\u2122 and examination of hard drives in line with accepted techniques for integrity and continuity of evidence.<\/p>\n<p>These issues can be an extraordinary pressure on IT Security Teams. These teams by definition cannot be expert at everything within the digital security arena. \u00c2\u00a0As a result\u00c2\u00a0incident response and e-discovery requirements are\u00c2\u00a0often\u00c2\u00a0handled incorrectly leaving the company open to criticism and legal action.<\/p>\n<p>A cost-effective solution now exists for IT security teams to manage their legal responsibilities from a central location by using software that ensures forensic integrity of data. From any location around the globe (law allowing) machines in the enterprise can be examined, hard drives imaged for forensic examination and necessary surveillance carried out.<\/p>\n<h3>Intelligent monitoring<\/h3>\n<p>The solution revolves around the pre-deployment of tiny covert software \u00e2\u20ac\u02dcagents\u00e2\u20ac\u2122 which can be deployed using standard patch management systems. The \u00e2\u20ac\u02dcagent\u00e2\u20ac\u2122 provides a point of contact for the Console which is used by the security team to communicate with each PC or Server. The \u00e2\u20ac\u02dcagent\u00e2\u20ac\u2122 allows the Console to connect to it using encrypted authentication and provides the operator with the ability to collect volatile evidence (network connections etc), RAM and even the entire drive. This is a way for providing a remote forensics solution for the enterprise.<\/p>\n<p>The \u00e2\u20ac\u02dcagent\u00e2\u20ac\u2122 also provides unparalleled abilities to monitor the computer for anomalous activity that can be set by the Remote Forensic Expert. This may include the amount of data traffic being generated or data being copied to an external device. This behaviour can notify the Remote Forensics Expert who can respond to an incident anywhere in the world immediately. The Remote Forensics Expert can grab an image of the screen of the remote PC, turn on keylogging and even sniff data packets being generated or received by the computer. This can act as intelligence gathering to make the decision whether to image the machine or not.<\/p>\n<h3>E-discovery<\/h3>\n<p>Increasing legislation, especially surrounding SOX, (Sarbanes-Oxley), in the USA is causing many companies headaches when e-discovery demands are made upon them. Our solution greatly simplifies the issues by allowing the Remote Forensics Expert to instruct each deployed \u00e2\u20ac\u02dcagent\u00e2\u20ac\u2122 to search for defined data criteria and either copy the data to a central store or just report its presence.<\/p>\n<p>For example, a law firm may require all data created after a certain date which contains particular keywords, alternatively they may wish to know which computers have a certain spreadsheet on them, and you can even query your enterprise to see which computers have accessed a particular web site. These capabilities make complying with e-discovery demands considerably simpler.<\/p>\n<p>Although there are other solutions in the marketplace which provide some of these elements, our solution is not bound to any specific forensic examination platform and is significantly more cost-effective.<\/p>\n<p>Disklabs has a team of digital forensics experts offering a range of investigatory and consultative capability. \u00c2\u00a0Let them advise you on a remote computer forensics solution today<\/p>\n<p>Call us on <strong>+44(0)1827 50000<\/strong> or use our <a href=\"http:\/\/disklabs.com\/contact\" target=\"_blank\">contact form<\/a> to let us know your requirements.<\/p>\n<p>&nbsp;<\/p>\n<p>Disklabs &#8211; <a href=\"http:\/\/disklabs.com\/forensics\/computer-forensics\" target=\"_blank\">Computer forensics services<\/a> for legal and civil investigation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Supporting the IT Department We live in an increasingly litigious world where companies can easily find themselves in the middle of legal action. Increasing corporate legislation means that considerable amounts of data must be made available usually from digital storage. Other cases including employee misconduct require a computer forensic response, including the \u00e2\u20ac\u02dcimaging\u00e2\u20ac\u2122 and examination [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[20],"tags":[],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/posts\/308"}],"collection":[{"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/comments?post=308"}],"version-history":[{"count":0,"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/posts\/308\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/media?parent=308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/categories?post=308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/tags?post=308"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.disklabs.com\/wp-json\/wp\/v2\/yst_prominent_words?post=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}