FTK ToolKit
FTK ToolKit
Forensic Toolkit (FTK) is built for speed, stability and ease of use. It provides comprehensive processing and indexing
up front, so filtering and searching is faster than with any other product. This means you can zero in on the relevant evidence quickly,
dramatically increasing your analysis speed. The database-driven, enterprise-class architecture allows you to handle massive data sets,
as it provides stability and processing speeds not possible with other tools. Furthermore, because of this architecture, FTK can be
upgraded easily to expand distributed processing and incorporate web-based case management and collaborative analysis.
Unmatched Processing
Processing Profiles
While other products can run out of memory and slow or crash
during processing, FTK is database driven which provides the
stability necessary to handle large data sets. In addition, FTK
components are compartmentalized allowing processing workers
to continue processing data even if the GUI stalls.
High
Performance
Computing &
Sophisticated
Data Analysis
Single-Node Enterprise
Apple OS Analysis
Mac features
that cant be
found in any
other Windows
analysis tool.
-- Ryan Kubasiak
www.AppleExaminer.com
Automatically construct timelines and establish relationships among parties of interest in an investigation.
Cerberus is the malware analysis component of AccessDatas integrated incident response platform, CIRT
(Cyber Intelligence & Response Technology). This module is also available as an add-on to FTK. The first step towards automated
reverse engineering, Cerberus allows you to determine the behavior and intent of suspect binaries, giving you actionable intelligence
without having to wait for a malware team to perform deeper,
more time consuming analysis.
Cerberus is able to disassemble and simulate the functionality of a suspect binary, without actually running the code. It does not rely on
white lists or black lists and it does not run the binary in a sandbox. This is of great value to first and second responders, because it not
only allows you to take decisive action more quickly, but it reveals behavior and intent without running the risk of triggering defense
mechanisms commonly found in malware.
CORPORATE HEADQUARTERS
801.377.5410
588 West 400 South
Suite 350
Lindon, UT 84042 USA
INTERNATIONAL SALES
+44 (0)20 7010 7800
[email protected]
www.accessdata.com