Computer Forensics / Data Capture
Computer forensics is the process of collecting, analysing and reporting digital data for use as legally admissible evidence; for example, in investigations into regulatory compliance, industrial espionage and theft of intellectual property. Compute forensics can also be useful in recovering data after a hardware or software failure.
Why do you need to use an access technology solution with your computer forensics / data capture tool?
Gaining access to 100% of network traffic is essential for successful forensics research. Switched portanalyser (SPAN) ports may not provide 100% of network traffic if they are over-subscribed or they may not be available for use when necessary. It may also be necessary to monitor multiple network segments simultaneously and aggregate the data to your forensics tools or to replicate the data to more than one network tool at the same time.
Network Critical solutions for computer forensics / data capture
By implementing a Network Critical Access Solution within your network infrastructure you can solve the problems associated with installing forensics tools. Breakout Test Access Points (TAPs) provide easy single-segment monitoring while the Aggregating and Regenerating TAPs allow you to combine different network segments as well as copy your data traffic to several network tools at the same time. The Smart Network Access System gives you the ability to do all of these things in a high-density environment and the flexibility to adjust to the changing needs of your data centre.
Find out more.
Network Critical is certified or works with the following vendors that sell computer forensics / data capture: