Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO Certified Computer Examiner Member: The International Society of Forensic Computer.

Slides:



Advertisements
Similar presentations
Provides Immediate understanding of eDiscovery/ESI Forensically Preserve & Collect ESI Handles Loose files, PSTs, NSFs, EnCase, Zip Files 34+ high quality.
Advertisements

Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
COEN 252 Computer Forensics
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Does this look familiar? Help is at hand with TurboNote+, the world’s leading sticky note and instant messenger program.
April 11-13, Session Title Presenters {Name} April 11-13, PRESENTED BY THE Managing E-Discovery in Small to.
Defensible Client File Collections 6 Common Roadblocks and Obstacles.
Guide to Computer Forensics and Investigations, Second Edition
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio specializes in developing high-quality enterprise.
Guide to Computer Forensics and Investigations Fourth Edition
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
Computer & Network Forensics
The sequence of folders to a file or folder is called a(n) ________.
PMI Inventory Tracker™
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
SharePoint Portal Server 2003 JAMES WEIMHOLT WEIDER HAO JUAN TURCIOS BILL HUERTA BRANDON BROWN JAMES WEIMHOLT INTRODUCTION OVERVIEW IMPLEMENTATION CASE.
Chapter 13: Sharing Printers on Windows Server 2008 R2 Networks BAI617.
Information Technology & Computer Science E-Discovery Lab Identification and Collection Seminar on E-Discovery, February 9th, 2012, College of Information.
July 9, National Software Reference Library Douglas White Information Technology Laboratory July 2004.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Get Off of My I-Cloud: Role of Technology in Construction Practice Sanjay Kurian, Esq. Trent Walton, CTO U.S. Legal Support.
Tutorial 11 Installing, Updating, and Configuring Software
Office Sync. What Does Office Sync Do?  Exchange data between field & office without a USB flash drive.  Planned and completed jobs  A/B guidance lines.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
6.1 Using AMO After this class, you will be able to: Install AMO
Visual Evidence / E-Discovery LLC Visual Evidence / E-Discovery LLC 60th Annual Meeting of the Ohio Regional Association of Law Libraries E-Discovery &
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
1 INTRODUCTION TO DATABASE MANAGEMENT SYSTEM L E C T U R E
Using a Template to Create a Resume and Sharing a Finished Document
Files and Folders What’s the difference?. What are files ? Collections of digital information created on or for computers click the mouse or press the.
Implementing Hyper-V®
Microsoft® has announced that it will end support for the Windows XP operating system on August 4 th, Top management has made this a priority for.
Mail Attender for Exchange Technical Overview Presentation Introduction Sherpa Software Group Narrated by Thomas Hand Approximate Time 15 minutes.
Automated Process of Electronic Discovery October 4, 2010.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Lesson 3: Migrating and Configuring User Data
Records Management for Paper and ESI Document Retention Policies addressing creation, management and disposition Minimize the risk and exposure Information.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
2: Operating Systems Networking for Home & Small Business.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
CloudKit 365 Office 365 reporting made easy. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael JonesDigital Forensic Investigations2.
HedEx Lite Obtaining and Using Huawei Documentation Easily
Lucidchart Extends Collaborative, Cross-Platform Diagramming Solution for Individuals, SMBs, and Enterprises with New Microsoft Office 365 Add-Ins OFFICE.
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
Chapter 3 Installing and Learning Software
Create setup scripts simply and easily.
Laplink PCmover.
Customized Solutions to your needs
Remote Collection What, When & Why.
Guide to Computer Forensics and Investigations Fifth Edition
Lesson 14 Sharing Documents
Get the Data that Cures Your Headache
ABOUT ME MY NAME IS DIOSDADO MACASAET OR DON
Presentation transcript:

Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO Certified Computer Examiner Member: The International Society of Forensic Computer Examiners

Pinpoint Labs Overview Website Software - PG Pinpoint -SafeCopy 2 -MetaDiscover Free Utilities -MetaViewer - SafeCopy -Hash - FileMatch Services -ESI Collections -Computer Forensic Investigations Research & Articles No-Nonsense File Collection No-Nonsense Metadata deNISTing Custodian Hard Drives Understanding File Time Stamps Blog Were files copied to a USB device? ESI Collection Methods Recovering files (unallocated space) When is a computer investigation needed? Imaging Hard Drives – Will you get what you expect?

Insanely fast deNISTing Legal departments, forensic examiners and service bureaus use PG Pinpoint to filter custodian files (often 30-50% reduction) prior to EED processing and review. PG Pinpoint can significantly reduce production cost by deNISTing and deduplicating custodian files at a rate of MB per minute. Feature Highlights: Includes more than 75 million NIST hashes Supports MD5, SHA-1 and TIGER hash lists Processes MB per minute Allows for customized hash lists Identifies encrypted files Creates forensically sound copies Compatible with all EED and litigation support applications

Electronically Stored Information (ESI) Collection Methods

SafeCopy 2 was created to address the need for a forensically sound active file collection application. SafeCopy 2 has a unique bit stream copy engine that preserves file contents, timestamps and metadata while creating an electronic chain of custody using MD5 hash verification. This allows the user to collect electronic files with minimal impact on the client’s systems. Feature Highlights: Select from multiple data sources (i.e. file shares, individual files or file list) Supports paths greater than 255 characters (up to 32,000) Detects and resumes after network outages Real time error display 100% file copy verification (using MD5 hash comparison) Preserves file system timestamps and metadata Filters by file extension (inclusion, exclusion and use file extension list) Filters by date range Desktop, Mobile, Server and Nomad editions

Electronically Stored Information (ESI) Collection Methods

Installed on the local computer Licensed to a single system Capable of accessing all local and networked devices SafeCopy 2 Desktop Edition

Portable between computers Runs from U3 USB device No installation required SafeCopy 2 Mobile Edition

Perfect for companies with ongoing collection needs Freedom to use SafeCopy 2 on any computer on your network Runs from server, external USB or NAS device No installation required SafeCopy 2 Server Edition

Easily distribute temporary SafeCopy 2 license Perfect for clients who have a one time, short term collection project Hassle free – No USB drive or software to track or return Runs from external hard drive, or flash drive Create job file for automated collection SafeCopy 2 Nomad Edition

Save money and use all of the SafeCopy 2 licenses SafeCopy 2 Enterprise Edition

Satisfied SafeCopy 2 Customers 3MGuidance Software American AirlinesIBM AnacompIntel Aon ConsultingJP Morgan Chase Bell CanadaKPMG Chesapeake EnergyKroll Ontrack DieboldLockheed Martin DTE EnergyMonsanto Encore LegalPhilips Ernst & YoungUS Department of Justice

Microsoft Office metadata often contains relevant information for both computer forensic investigations and litigation document review. MetaDiscover allows users to quickly review extended metadata properties without using Microsoft Office. Feature Highlights: Access 37 Microsoft Office metadata fields Investigate last 10 authors and locations Uncover additional evidence sources Scrub documents per hour Extract 45K+ documents per hour Specify redaction text

Software Pricing PG Pinpoint1-4 $ Each ($995 SW+$199 UA) SafeCopy 2.2 Desktop (SC2DT) SafeCopy 2.2 Mobile (SC2ME) SafeCopy 2.2 Server (SC2SE) Addition SC2SE users SafeCopy 2.2 Enterprise 1-4 $ Each ($99 SW+$17.82 UA) 1-4 $ Each ($199 SW+$35.82 UA) 1 $ ($799 SW+$ UA) -Includes 3 concurrent users 1 $177 ($150 SW + $27 UA) Annual subscription pricing based on total SC2 licenses MetaDiscover1-4 $ Each ($399 SW+$71.82 UA ) -Software (SW) -Annual Upgrade Assurance (UA)

Thank You! Website Software - PG Pinpoint -SafeCopy 2 -MetaDiscover Free Utilities -MetaViewer - SafeCopy -Hash - FileMatch Services -ESI Collections -Computer Forensic Investigations Research & Articles No-Nonsense File Collection No-Nonsense Metadata deNISTing Custodian Hard Drives Understanding File Time Stamps Blog Were files copied to a USB device? ESI Collection Methods Recovering files (unallocated space) When is a computer investigation needed? Imaging Hard Drives – Will you get what you expect?