Home > Services > Forensic and Litigation Support Services > Forensic Technology Products & Tools
For Software Training /Product Purchase enquiries:
For enquiries relating to software training or purchase of any of the following products, please contact our Sales Representative at solution@nexiats.com.sg and provide us with your full name as well as your company name.
Compact, built with 8” display 4 SAS ports (2 Suspect, 2 Evidence ports), 8 USB3.0 ports, and one Thunderbolt 3.0 port. It is fully equipped with Remote Capture Kit, Drive Emulator option enabled, supplied with TB 3.0 to PCIE 3.0 expansion box and with M.2 SATA and M.2 NVMe Adapters.
Compact, built with 8” display 2 SATA ports with power (1 Suspect, 1 Evidence ports), 2 NVMe ports (1 Suspect, 1 Evidence ports), 3 e-SATA ports, 8 USB3.0 ports, and one Thunderbolt 3.0 port. Include 2 M.2 NVMe adapters and 2 NVMe 2.5” cables
Carry case, built with 12” display 4 SAS ports (2 Suspect, 2 Evidence ports), 4 USB3.0 ports (2 Suspect, 2 Evidence ports), and one e-SATA port. The large display makes the unit very suitable to run a full forensic analysis in the field
Lab unit heavy duty with 8 SAS/SATA ports and 6 USB3.0 ports enable the user to run 4 simultaneous sessions of 1:1 Forensic Imaging with HASH calculation and verification, or upload 8 SAS/SATA Suspect drives to the network in a very good performance
Magnet AXIOM is a comprehensive platform for start to end Digital Forensics for acquisition, recovery, analysis and reporting. Magnet AXIOM is the only platform that has the ability to capture and analyse smartphone, cloud, computer, IoT and third party image data in a single case file. This ensures that no correlations are missed when analysing all the recovered evidence within the case.
• Magnet AXIOM helps the investigator to streamline the imaging of multiple data sources especially for case with multiple digital devices
• Allows for queuing up of image acquisition to ease the time required for imaging all the devices in a case
• Provides a wide coverage of image acquisition capabilities for smartphones, cloud and multiple operating systems including Windows, Linux and OS X.
• Magnet AXIOM pulls and recovers artifacts from both allocated and unallocated space within a single case file.
• Identifies if the recovered artifacts is relevant which include placing them into categories such as browser history, email, chats, pictures, videos, documents, social networks and much more
• Searches and recovers data from third-party images, including E01, DD, .BIN, and more.
• Magnet AXIOM allows for connections between different artifacts recovered from different devices to be easily established within the same case file
• Features the ability to allow a user to add on additional evidence to the case during analysis thus allowing the user to see the full picture
• Provides source linking which allows the user to jump from an individual recovered artifact in the Artifact Explorer directly to the original file source location in addition to other helpful features such as filter stacking and centralizing viewing for quickly identifying the most relevant correlations and results.
• Magnet AXIOM presents information in a format that non-technical people can make sense of thus easing the difficulty of sharing findings with others
• Has true view exports which enable examiners to present their findings in a customized view that fits their particular reporting needs and parameters without having to manipulate exported findings into a report template
• Allows for creation of portable cases which allows for collaboration and quick sharing if multiple investigators need to assume the investigation and analysis of a case
Intella, a forensic search tool which is intuitive, comprehensive and simple for users to use. Intella focuses on user created data such as email files, cell phone records, office documents, PDFs and other files that are easily interpreted by a person and differs from computer forensic analysis in that it does not seek to review or analyse the lower level system files such as the registry, link files or disk level issues more commonly associated with traditional computer forensic analysis.
Using a Forensic Search tool such as Intella instead of a Forensic Analysis tool will greatly reduce your costs, improve your staff’s productivity, and reduce the time it takes to carry out an investigation.
Choosing the right Intella product for you
All Intella products can process Electronic Stored Information, search metadata and content, filter by a range of criteria and produce to most standard load file formats.
Intella TEAM enables collaboration between multiple individuals to review the case simultaneously. It is ideal for any agency, law firm or investigation team who need to process, search and analyse large amounts of Electronically Stored Information (ESI) / evidence by multiple users.
Intella PRO is for users who need to process, search, filter and produce Electronically Stored Information (ESI) / evidence in excess of 250 gigabytes. Intella Pro was designed for corporate investigators, legal investigators, professional service firms and consultants who have a need to review larger amounts of ESI.
Intella 10, 100, 250 offer the same features as Intella Pro. The only difference that defines each one is the amount of Electronically Stored Information (ESI) you can process, search, filter and produce. For example, Intella 250 allows you to search up to 250GB, Intella 100 up to 100GB and Intella 10 up to 10GB. These products are the ideal email investigation and eDiscovery software for single users.
Intella VIEWER is an optional companion for Intella Pro, 250 and 100. It performs the same process, search and analysis functions as Intella Pro, 250 and 100 except for processing and creating a new case. Thus the Viewer enables additional investigators to view an existing case on a different computer (limit of 2 Viewers with Intella 100, 3 Viewers with 250, 4 Viewers with Intella Pro and 8 Viewers for Intella TEAM).
Hibernation Recon has been developed to not only support memory reconstruction from Windows XP, Vista, 7, 8/8.1, and 10 hibernation files, but to properly identify and extract massive volumes of information from the multiple levels of slack space within them. Proper exploitation of Windows hibernation files can allow digital forensics experts to “look back in time” and uncover compelling evidence that exists nowhere else.
Features
Registry Recon provides access to an enormous volume of Registry data which has been effectively deleted, whether that deletion occurred due to benign system activity, malfeasance by a user, or even re-imaging by IT personnel. Your timelines can now include Registry data that was active, backed up in restore points or volume shadow copies, or carved from unallocated space. While Registry Recon displays unique Registry data by default, seamless access to all instances of particular Registry keys and values is available (with full paths and sector offsets) so your findings can be efficiently authenticated.
Reveal
Features
Axxera’s 4N6 was developed with a forward vision of an ever-expanding digital forensic market. With a need of the integration of different forensic tools in single console.
Axxera 4N6 aids in the management of all Digital Forensic cases using various Digital Forensic Tools in one centralized portal designed specifically for the public and private sectors as well as law enforcement agencies.
Axxera 4N6 has Built unique API integrated solutions with all the forensic tools to seamlessly synchronize and retrieve case management and forensic investigation details from each specific tool.
Axxera 4N6 Manages digital forensic cases and investigations. Now our customers will be able to manage their cases in a single, unified platform. 4N6 easily captures and tracks cases, reports and findings with its automated case workflow management. It also assigns and tracks lines of investigation, raises actions and assigns them to your investigative team
Axxera 4N6 Provides a solid foundation for an Agency’s Digital forensic management by providing a centralized user interface that offers role-based access by function and a global view to access real-time analysis, case management and reporting.
Customers will be able to attach all the evidence and related documents to their cases. They will be able to manage documents from one location. 4N6 supports different document formats, which include Media files and tool specific output formats.
All the evidence data and files stored will be completely encrypted by our proven DATA at REST technology. The encryption technology SPx (Secure Parser extended) meet all regulatory compliance. It is FIPS 140-2 certified, EAL4+ compliance and secure.
Axxera’s Advanced Correlation Engine (CE) module offers sophisticated correlation and analysis of all Evidence data in a uniquely intuitive fashion. With a practical combination of flexibility, usability and comprehensive data analysis, the Correlation Engine delivers real-time visibility to related cases and investigations that are otherwise undetectable in any practical way.
Axxera 4n6’s built-in Software and tool asset management acts like a CMDB for all the forensic tools. 4n6 helps in license management, for support and maintenance tracking.
Axxera’s 4n6 delivers comprehensive reporting by allowing the management and the investigation teams of an organization to execute numerous pre-programmed reports and dashboards as well as updates and notifications on cases. Axxera 4n6 has the capability to provide dashboards, reports and rule templates for agency specific customization and as per the compliance needs. It Creates reports using graphs and maps to give your data instant meaning. Additionally it selects and changes visualizations, drills down into reports to get more specific data, visualizes trends and offers beautiful summary reports by region, case type, investigator, department, etc.
The Kanguru Defender® series offers the most advanced security options, convenience and data portability available.
Data Security is now at your fingertips. Ranges of thumb drives and hard disks come with hardware encryption and pin-activated.