Loading...
0  
$0.00
Your cart

You have no items in your shopping cart.

The product quantity has been updated
Show cart

 

AccessData FTK 6

Be the first to review this product

$3,995.00

Availability: In stock

* Required Fields

$3,995.00

 

Description

Forensic Toolkit® (FTK®): Recognized around the World as the Standard Digital Forensic Investigation Solution.

FTK is a court-cited digital investigations platform built for speed, stability and ease of use. It provides comprehensive processing and indexing up front, so filtering and searching is faster than with any other product. This means you can “zero-in” on the relevant evidence quickly, dramatically increasing your analysis speed. Furthermore, because of its architecture, FTK can be setup for distributed processing and incorporate web-based case management and collaborative analysis.

Visualize Big Data, Find the Relevant Evidence Faster

FTK’s database-driven, enterprise-class architecture allows you to handle massive data sets, as it provides stability and processing speeds not possible with other tools. It provides built-in data visualization and explicit image detection technology to quickly discern and report the most relevant material in your investigation. FTK’s interoperability with all AccessData’s solutions, allows you to correlate massive data sets from different sources, such as, computer hard-drives, mobile devices, network data, internet storage and more. This capability makes FTK the only digital investigation solution capable to reduce case investigative times by allowing you to review data and identify relevant evidence, all in one centralized location.

Automated Malware Triage and Analysis

Available as an add-on to FTK, Cerberus allows you to determine the behavior and intent of suspect binaries, giving you actionable intelligence without having to wait for the malware team to perform deeper, more time consuming analysis. This automated malware triage and analysis allows you to:
- Gain actionable intelligence in seconds to validate threats and take decisive action.
- Achieve signature-less malware detection with proactive threat scans.

Technical Specs

Accessories

Downloads

Guides

 

If you would like to request information on multiple products, please use the add to quote button located on each product page and submit by clicking the quote request link in the menu.

 

If you would like more information about this product, please contact us and a sales representative will get back to you within 48 hours.

Request Additional Information

* Required Fields