In today's environment, information security forensic analysis is frequently needed to encompass complex networked environments, where investigation needs to encompass an entire operating environment, including a multitude of servers (e.g. file, print, communications and e-mail), as well as remote access facilities.
Where a follow-up action against a person or organization after an information security incident involves legal action (either civil or criminal), evidence through forensic analysis should be collected, retained, and presented in support of potential legal action in accordance with the rules for evidence in the relevant jurisdiction(s).
Where identified by prior assessment as required for evidential purposes, de facto in the context of a significant information security incident, information security forensic analysis should also be conducted.
Our Forensics Analysis Services involve the use of IT based investigative techniques and tools, supported by documented procedures, to review the designated information security incident(s) in more detail. Our Information security forensic analysis IT based tools comply with standards such that their accuracy cannot be legally challenged, and are always be kept up-to-date in line with technology changes.