In the event of either logical or physical damage, we have the capability to recover data f rom all types of digital media including all RAID configurations.
Myriad View Limited has built up considerable expertise in:
Working with our strategic partner, AccessData, we provide a comprehensive range of covert internet investigation and analysis including email analysis, packet capture, web profiling, identity determination, posting and visibilitymonitoring, domain control mapping, identification of malicious posting sources, intellectual property Intelligence services and internet risk/threat mitigation. Using highly-specialised proprietary software and hardware, coupled with our sophisticated human intelligence operations, we have the capability to mine information from the parts of the net that are not normally open to public scrutiny. We can correlate vast volumes of disparate intelligence into meaningful information, giving us the ability to investigate threats to your products, intellectual property, market and channels
We conduct forensic examination and analysis of a wide range of digital media including hard disks, floppy disks, CD and DVD media, mobile phones, organisers (PDAs), digital storage cards (such as SmartDrive, CompactFlash and memory sticks) printers, fax machines, SANs, NASs, email systems and so on. In fact, we pride ourselves on conducting leading edge research and developing forensic protocols for the examination of some of the more exotic forensic and Unusual devices, such as satellite navigation systems, games consoles and television access cont rol systems.
We can provide rapid response on site (covert or overt) as well as lab-based forensic imaging of digital media including PCs, servers, networks and removable media. We use a number of industrystandard methodologies and forensic Applications including Encase FTK, Safeback and Linux DD.
Services assisting either applicants and/or respondents to meet their objectives efficiently and economically. Unusual devices, such as satellite navigation systems, games consoles and television access cont rol systems.
External and internal penetration testing using NSA-approved technical consultants and methodologies.
We conduct information security, IT security and physical security policy and procedure audits using trained and accredited staff.