Investigative Techniques Designed to Meet Your Specific Needs
IDM can perform a variety of processes on the data that reveals, recovers, and reports on data not readily accessible to users.
We work with you to define the goals of the investigation, and employ the necessary tools to complete the analysis. Using proven software such as EnCase® Forensic, AccessData's Forensic Toolkit® (FTK), and X-Ways® our forensic analysts can evaluate:
- Desktop Computers
- Network Drives
- External Media
- PDA's & Mobile Phones
- Legacy Systems
At the conclusion of our analysis, a comprehensive report details the objectives, results, and any further recommendations.