• Cisco
    Cisco a partner with us provides:
    Firewalls, Switches, Routers and so much more products
  • Finjan
    A product of M86 Security that >>Offers secure web gateway solutions for the enterprise market. >> Provides a unified web security solution combining multi-layered security with productivity...
  • M86 Security
    Our partner that offers content filtering engines like >>Mail Marshal >> Web Marshal
  • McAfee
    Offers a wide range of security products like: >>Data Loss Prevention >>Endpoint Protection >> Network Protection >>USBEncryption ... & so much more products
  • Symantec
    One of our partner that offers a wide range of security products like: >>Backup Exec
  • Others
    More of our partners: Net IQ, Access Data, Microsoft, SAP, VeriSign, TippingPoint, eSoft, Redhat & Cyberoam



Identify • Collect • Preserve • Process • Review • Produce

AccessData eDiscovery is a complete, turnkey eDiscovery solution. It is the only solution that addresses all data equally, enabling you to identify, preserve and process data from desktops, servers, popular data repositories, databases and email. No longer will you need to utilize several products to effectively respond to your litigation matters. Robust search, collection and processing capabilities, along with advanced workflow management, logging and reporting, allow you to address the eDiscovery life-cycle with a single solution. In addition to its expansive functionality, AccessData eDiscovery - when compared to other in-house solutions on the market - is by far the easiest to use.

AccessData Enterprise

Investigation and Analysis with Enterprise-wide reach. Achieve Visibility into all data across the Enterprise.

Despite all the money spent on preventative technologies, bad things still happen. The method of detection is often just accidental discovery. While perimeter defense and alerting technologies serve a critical role in the protection of information assets, an investigative infrastructure is of equal importance. How do you identify security breaches that have circumvented your defenses? How do you detect intellectual property theft when the offender is a technologically sophisticated employee? How do you verify fraudulent activity without alerting those that you are investigating?

AccessData® Enterprise allows you to achieve visibility into all data across the enterprise, enabling you to detect, identify, analyze and forensically preserve data, as well as remediate security issues. It is a new breed of investigative product built for scale, speed and broad functionality. This easy-to-use solution delivers network-wide investigative reach, allowing you to enforce policies, protect your data and employees, and reduce costs.

AccessData FTK© Mobile Phone Examiner

AccessData Deliver the most comprehensive Mobile Phone Solution.

Law enforcement and government agencies around the world need a reliable and comprehensive solution to acquire and analyze mobile phone data. Mobile phones often contain the important incriminating evidence that investigators require to solve a case. Yet, until now, investigators had to juggle multiple solutions, deal with unstable technologies and waste valuable time searching for tools to support all the phones they encounter in the field. AccessData is ending those struggles with FTK Mobile Phone Examiner. Mobile Phone Examiner integrates with Forensic Toolkit® technology, allowing you to forensically acquire and analyze mobile phone data within the FTK® Interface. Furthermore, FTK 2.0 is easily the most stable and user-friendly forensic analysis solution on the market, giving investigators a more efficient way to complete investigative tasks.

This Integration allows you to correlate phone evidence with computer evidence easily and enables advanced reporting to detail phone data - call history, contacts, messages, photos, voice recordings, video files, calendar, tasks, notes and more. With the broadest support for mobile phones coming soon and the advantage of utilizing the FTK solution's unsurpassed analysis capabilities, FTK Mobile Phone Examiner is the must-have mobile phone forensic tool.

AccessData SilentRunner©

Capture Real-time Network Data to Detect, Investigate and Properly Remediate Security Breaches, Data Theft and Policy Violations…

The success of organizations today relies significantly on the security and availability of their networks. However, networks are complex and their topographies are always changing, forcing you to react constantly. Security breaches are increasing, with more than 70% being perpetrated by authorized employees. Furthermore, organizations are under pressure to comply with regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes–Oxley (SOX), as well as internal security and human resource policies, to ensure the integrity and availability of their systems. Given the broad spectrum of risk, organizations clearly require a network security investigation solution that can help you build network usage intelligence, identify suspicious patterns and expose weaknesses and anomalies.

SilentRunner answers the difficult question of “What happened?” in the aftermath of a security incident by tackling the complicated tasks of capturing, analyzing and visualizing network data. It provides a passive network monitoring solution that visualizes network activity by creating a dynamic picture of communication flows to swiftly uncover break-in attempts, weaknesses, abnormal usage, policy violations and misuse, and anomalies before, during and after an incident. Operating like a surveillance camera, SilentRunner can play back events from thousands of communications to validate system threats and investigate security breaches. It identifies the offender and helps you mitigate the recurrence of the same security incident. In addition, it helps monitor infractions to regulatory controls and policy violations by providing supporting reports for auditing requirements contributing to your ability to demonstrate compliance.


  • Quantify and mitigate risk
  • Enable security due diligence
  • Obtain a solid ROI
  • Increase security
  • Support regulatory compliance
  • Reduce costs
  • Improve operational efficiencies