Home » Computer Forensic


EnCase® Forensic

EnCase® Forensic, the investigation solution, is for forensic practitioners who need to conduct efficient, forensically sound data collection and investigations using a repeatable and defensible process. The proven, powerful, and trusted EnCase® Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.

Find more about EnCase® Forensic v7 here.


Encase Portable

EnCase® Portable is a powerful solution, delivered on a USB device, that allows forensic professionals and non-experts to quickly and easily triage and collect vital data in a forensically sound and court-proven manner.

Find more about EnCase® Portable here.


EnCase® Enterprise

EnCase® Enterprise, the market leading remote forensic solution, enables internal investigation and incident response teams with the capability to conduct discreet, cost effective investigations over the network with no disruption to employees. This powerful solution, trusted by more than 60% of the Fortune 500 and countless government agencies allows organizations to facilitate HR and Fraud investigations, computer security incident investigations and more across a wide variety of devices for fast, efficient investigations that lead you to the evidence you need to make your case.

Find more about EnCase® Enterprise here.



Forensic Toolkit®

Forensic Toolkit® (FTK®) is recognized around the world as the standard in computer forensics software. This court-accepted digital investigations platform is built for speed, analytics and enterprise-class scalability. Known for its intuitive interface, email analysis, customizable data views and stability, FTK lays the framework for seamless expansion, so your computer forensics solution can grow with your organization’s needs.

Find more about FTK here.


AccessData Lab

AccessData® enables computer forensics labs of all sizes, facing an array of challenges, to work more effectively. A single-person lab can radically speed up the processing of cases with the 4-worker distributed processing available with FTK. Computer forensics labs handling a greater number of cases with larger data sets will benefit significantly from the distributed processing and collaborative analysis capabilities found in FTK Pro. Finally, large labs handling massive data sets, utilizing a distributed workforce, or looking to collaborate with lawyers, HR personnel and other non-forensic parties can step up to AccessData Lab. AD Lab adds powerful and intuitive web-based review functionality, expanded distributed processing capabilities with a centralized processing farm, and a centralized database infrastructure. Regardless of the size, scope or mission of your computer forensics lab, AccessData has a solution that will meet your needs.

Find more about AD Lab here.


SilentRunner Mobile

Operating like a network surveillance camera, SilentRunner Mobile allows you to monitor, capture, analyze and graphically visualize network traffic to see exactly what a suspect is doing during a law enforcement or government digital investigation. Captured network activity can be played back on demand. Furthermore it’s easy to deploy to enable quick access to network traffic once surveillance is determined to be necessary.

It is a passive network monitoring solution that visualizes network activity by creating a dynamic picture of communication flows, giving you a clear picture of your suspect’s activities. SilentRunner Mobile can play back events from thousands of communications to validate whether criminal or malicious activity has taken place. This dramatically enhances your ability to identify all offenders and exploits, build a case, and locate any stolen information or misused resources.

Find more about SilentRunner Mobile here.



Forensic Bridges

Tableau forensic bridges (a.k.a. “write-blockers”) are recognized worldwide for their reliability, ease-of-use, exceptional performance, and value. We offer a full line of native IDE, SATA, SCSI, USB, FireWire, and SAS forensic write-blockers. More forensic professionals rely on Tableau products for their data acquisition needs than any other brand.
Classic Enhanced, Classic, Pocket, and Innovation products remain an important part of forensic kits sold by leading US and international forensic resellers. Our innovative OEM products are integral components of the world’s best-selling and most popular forensic workstations and lab imaging solutions.

Find more about Forensic Bridges here.


Forensic Duplicators

Forensic Duplicator provides forensic (write-protected source drive) disk-to-file or disk-to-disk duplication.

Find more about Forensic Duplicators here.



Videntifier™ Forensic

Videntifier™ Forensic provides police authorities with an automatic and easy-to-use video identification system. A single mouse click is sufficient to automatically scan an entire hard drive for suspicious and illegal video material. With its speed, Videntifier™ Forensic saves investigators precious time, which they can spend on other more challenging tasks, rather than inspecting thousands of video files manually. At the end of each scan Videntifier™ Forensic returns a summary report, listing which videos have been identified.

Find more about Videntifier™ Forensic here.