Product Briefs
FTK 8.0 marks a major step forward for the digital forensics gold standard, FTK Forensic Toolkit. With an all-new, intuitive interface and exciting timeline, multimedia analysis, and other new features on top of the industry's fastest ingestion and processing. Learn how this exciting new release can help you solve complex cases faster with FTK's brand new interface designed to lead investigators directly to key evidence.
Product Briefs
FTK Connect for Law Enforcement helps digital forensic investigators power through case backlogs and accelerate forensic investigations by automating FTK workflows. Eliminate time spent waiting for jobs to be completed and get cases to examiners in half the time by using FTK Connect to automate case creation and evidence processing, then informing investigators when their jobs are finished.
Podcast
We take a look at the powerful options FTK Enterprise users have when working with Powershell and our agents in Post Breach investigations.
Podcast
This is episode 1 where Lynne Roossien and Justin Tolman discuss the many new features that have been released in the last year or two.
White Papers
Blog
For the final interview in our Inside Exterro series, we talked with Harsh Behl, Director of Product Development for Exterro's digital forensic software, FTK Forensic Toolkit.
Blog
Read this blog post for tips on starting up your corporate digital forensic investigations using email and internet analysis techniques..
Blog
Read this blog post to learn about some of the challenges faced by DFIR professionals investigating financial crimes--and some ways technology can help overcome them.
White Papers
Use Cases for Enterprise Digital Forensic Software
Blog
Read this blog post to learn about timeline features and the role they can play in resolving digital forensic investigations.
Blog
Read this blog article to learn what it means to be forensically sound and why forensic soundness is so important in digital forensic investigations.
White Papers
Die Finanzkriminalität ist ein ernstzunehmendes Thema, das viele Facetten hat. Sowohl externe Bedrohungen wie Datenschutzverletzungen, Ransomware und Schadsoftware sowie interne Bedrohungen wie das Herausschleusen von Daten und der Diebstahl geistigen Eigentums sind konstante Risiken.