Internet Investigations

Working with our strategic partner, AccessData, we provide a comprehensive range of covert internet investigation and analysis including email analysis, packet capture, web profiling, identity determination, posting and visibilitymonitoring, domain control mapping, identification of malicious posting sources, intellectual property Intelligence services and internet risk/threat mitigation. Using highly-specialised proprietary software and hardware, coupled with our sophisticated human intelligence operations, we have the capability to mine information from the parts of the net that are not normally open to public scrutiny. We can correlate vast volumes of disparate intelligence into meaningful information, giving us the ability to investigate threats to your products, intellectual property, market and channels

Forensic Investigations

We conduct forensic examination and analysis of a wide range of digital media including hard disks, floppy disks, CD and DVD media, mobile phones, organisers (PDAs), digital storage cards (such as SmartDrive, CompactFlash and memory sticks) printers, fax machines, SANs, NASs, email systems and so on. In fact, we pride ourselves on conducting leading edge research and developing forensic protocols for the examination of some of the more exotic forensic and Unusual devices, such as satellite navigation systems, games consoles and television access cont rol systems.

Forensic Incident Response

We can provide rapid response on site (covert or overt) as well as lab-based forensic imaging of digital media including PCs, servers, networks and removable media. We use a number of industrystandard methodologies and forensic Applications including Encase FTK, Safeback and Linux DD.

eDiscovery & eDiscovery

Services assisting either applicants and/or respondents to meet their objectives efficiently and economically. Unusual devices, such as satellite navigation systems, games consoles and television access cont rol systems.

Information Security Evaluations

External and internal penetration testing using NSA-approved technical consultants and methodologies.

Typical Assignments

  • Attack & Penetration Testing
  • Virtual Private Networking (VPN)
  • Network Vulnerability Assessment
  • Firewall Analysis and Implementation
  • Security Vulnerability resolution Support
  • Security Architecture review and Development
  • Security Policy Development and Implementation
  • Intrusion Detection System Analysis and Implementation

Information Security Assessments

We conduct information security, IT security and physical security policy and procedure audits using trained and accredited staff.