FORENSIC FUNDAMENTALS WEBINAR WITH MAGNET FORENSICS
YOU ARE INVITED TO JOIN THE FORENSIC FUNDAMENTALS WEBINAR WITH MAGNET FORENSICS
We at Credence Security are creating a forensic community where people can learn, share and help members of The Credence Security Forensic Fundamentals Community .
INVESTIGATING WITH MAGNET AXIOM & AXIOM CYBER 4.0
19th May 2020 | 13:00-14:30 GST (GMT +4)
Join us to learn about Magnet AXIOM’s support for artifacts from multiple evidence sources, including cloud, smartphone backups, computer hard drives, and memory. We will explore advanced recovery acquisitions , how AXIOM leverages machine learning for faster examinations, hex decoding, how to leverage our Connections features for relationship linking, Timeline, and more! We will also look into our remote acquisition feature for Windows and Mac through AXIOM Cyber. Finally, learn about AXIOM’s flexible reporting options for sharing your findings with your stakeholders.
Magnet Forensics is a global leader in the development of digital investigation software that acquires, analyzes and shares evidence from computers, smartphones, tablets and IoT related devices.
The Complete Digital Investigation Platform
Recover digital evidence from the most sources, including smartphones, cloud services, computers, IoT devices and third-party images.
Use powerful and intuitive Analytics tools to easily analyze all data in one case file.
AXIOM’s advanced parsing and carving techniques get the most data from each evidence source. Data can be presented in a clear and direct way with easy reporting on the results. Plus, with built-in analytics features like Connections, Timeline, and Magnet.AI, you can automatically generate insights that could lead to important breakthroughs in your examinations.
- RECOVER DATA FROM THE MOST SOURCES
AXIOM is the complete investigation platform with the ability to recover, analyze, and report on data from mobile, computer, and cloud sources. Features like Timeline analyze data across all evidentiary source.
- FIND KEY EVIDENCE QUICKLY
Uncovering the evidence you need has never been easier. The Magnet.AI module, an industry-first machine learning technology, searches both text-based and media content to automatically identify nudity, weapons, drugs, and sexual conversations.
- VISUALIZE CONNECTIONS BETWEEN FILES, USERS, AND DEVICES
Discover the full history of a file or artifact to build your case and prove intent. Connections in AXIOM visualizes evidence from disk and memory to show where files came from, who they are connected to, and where they’re stored.
- GET ADVANCED MAC SUPPORT
Investigate Mac devices with AXIOM — which supports both HFS+ and APFS as well as decryption of FileVault 2 encrypted drives, volumes, and partitions. Discover more macOS artifacts with AXIOM such as AirDrop, Live Photos, KTX files, and iCloud Tabs.
Magnet AXIOM Cyber
Simplify Your Remote Forensic Investigations
A digital forensics solution tailored to meet the needs of organizations that perform remote acquisitions as well as collect and analyze evidence from cloud storage and communication services, computers and mobile devices.
- COVERT REMOTE COLLECTION
AXIOM Cyber enables you to quickly and covertly perform remote collections from Windows and macOS devices with an ad hoc agent. Automatically reconnect to the target if it goes offline and resume collections from where it left off.
- ADVANCED CLOUD ACQUISITION
Use admin credentials to acquire data from Office 365, G Suite, and Box so you don’t tip off the target to an ongoing investigation. Collect data from corporate cloud services like AWS S3, EC2 and Azure virtual machines as well as MS Teams and Slack.
- REDUCE COMPLEXITY
AXIOM Cyber’s artifacts-first approach immediately presents the data needed to work through your case with ease and efficiency. Powerful Analytics features like Timeline, Connections and Magnet.AI save time and hassle.
- GET ALL THE EVIDENCE YOU NEED
AXIOM Cyber brings together evidence from Macs, PCs, mobile devices and cloud sources in a single case file so you can see the whole picture. Plus, acquire memory and unencrypted collections of files even when the source drive is encrypted.