Presentation is loading. Please wait.

Presentation is loading. Please wait.

Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO Certified Computer Examiner Member: The International Society of Forensic Computer.

Similar presentations


Presentation on theme: "Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO Certified Computer Examiner Member: The International Society of Forensic Computer."— Presentation transcript:

1 Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO Certified Computer Examiner Member: The International Society of Forensic Computer Examiners

2 Pinpoint Labs Overview Website www.pinpointlabs.com Software - PG Pinpoint -SafeCopy 2 -MetaDiscover Free Utilities -MetaViewer - SafeCopy -Hash - FileMatch Services -ESI Collections -Computer Forensic Investigations Research & Articles No-Nonsense File Collection No-Nonsense Metadata deNISTing Custodian Hard Drives Understanding File Time Stamps Blog www.pinpointlabs.com/wordpress/ Were files copied to a USB device? ESI Collection Methods Recovering files (unallocated space) When is a computer investigation needed? Imaging Hard Drives – Will you get what you expect?

3 Insanely fast deNISTing Legal departments, forensic examiners and service bureaus use PG Pinpoint to filter custodian files (often 30-50% reduction) prior to EED processing and review. PG Pinpoint can significantly reduce production cost by deNISTing and deduplicating custodian files at a rate of 300-500 MB per minute. Feature Highlights: Includes more than 75 million NIST hashes Supports MD5, SHA-1 and TIGER hash lists Processes 300 - 500 MB per minute Allows for customized hash lists Identifies encrypted files Creates forensically sound copies Compatible with all EED and litigation support applications

4 Electronically Stored Information (ESI) Collection Methods

5 SafeCopy 2 was created to address the need for a forensically sound active file collection application. SafeCopy 2 has a unique bit stream copy engine that preserves file contents, timestamps and metadata while creating an electronic chain of custody using MD5 hash verification. This allows the user to collect electronic files with minimal impact on the client’s systems. Feature Highlights: Select from multiple data sources (i.e. file shares, individual files or file list) Supports paths greater than 255 characters (up to 32,000) Detects and resumes after network outages Real time error display 100% file copy verification (using MD5 hash comparison) Preserves file system timestamps and metadata Filters by file extension (inclusion, exclusion and use file extension list) Filters by date range Desktop, Mobile, Server and Nomad editions

6 Electronically Stored Information (ESI) Collection Methods

7 Installed on the local computer Licensed to a single system Capable of accessing all local and networked devices SafeCopy 2 Desktop Edition

8 Portable between computers Runs from U3 USB device No installation required SafeCopy 2 Mobile Edition

9 Perfect for companies with ongoing collection needs Freedom to use SafeCopy 2 on any computer on your network Runs from server, external USB or NAS device No installation required SafeCopy 2 Server Edition

10 Easily distribute temporary SafeCopy 2 license Perfect for clients who have a one time, short term collection project Hassle free – No USB drive or software to track or return Runs from external hard drive, or flash drive Create job file for automated collection SafeCopy 2 Nomad Edition

11 Save money and use all of the SafeCopy 2 licenses SafeCopy 2 Enterprise Edition

12 Satisfied SafeCopy 2 Customers 3MGuidance Software American AirlinesIBM AnacompIntel Aon ConsultingJP Morgan Chase Bell CanadaKPMG Chesapeake EnergyKroll Ontrack DieboldLockheed Martin DTE EnergyMonsanto Encore LegalPhilips Ernst & YoungUS Department of Justice

13 Microsoft Office metadata often contains relevant information for both computer forensic investigations and litigation document review. MetaDiscover allows users to quickly review extended metadata properties without using Microsoft Office. Feature Highlights: Access 37 Microsoft Office metadata fields Investigate last 10 authors and locations Uncover additional evidence sources Scrub 2000+ documents per hour Extract 45K+ documents per hour Specify redaction text

14 Software Pricing PG Pinpoint1-4 $1194.00 Each ($995 SW+$199 UA) SafeCopy 2.2 Desktop (SC2DT) SafeCopy 2.2 Mobile (SC2ME) SafeCopy 2.2 Server (SC2SE) Addition SC2SE users SafeCopy 2.2 Enterprise 1-4 $116.82 Each ($99 SW+$17.82 UA) 1-4 $234.82 Each ($199 SW+$35.82 UA) 1 $942.82 ($799 SW+$143.82 UA) -Includes 3 concurrent users 1 $177 ($150 SW + $27 UA) Annual subscription pricing based on total SC2 licenses MetaDiscover1-4 $470.82 Each ($399 SW+$71.82 UA ) -Software (SW) -Annual Upgrade Assurance (UA)

15 Thank You! Website www.pinpointlabs.com Software - PG Pinpoint -SafeCopy 2 -MetaDiscover Free Utilities -MetaViewer - SafeCopy -Hash - FileMatch Services -ESI Collections -Computer Forensic Investigations Research & Articles No-Nonsense File Collection No-Nonsense Metadata deNISTing Custodian Hard Drives Understanding File Time Stamps Blog www.pinpointlabs.com/wordpress/ Were files copied to a USB device? ESI Collection Methods Recovering files (unallocated space) When is a computer investigation needed? Imaging Hard Drives – Will you get what you expect?


Download ppt "Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO Certified Computer Examiner Member: The International Society of Forensic Computer."

Similar presentations


Ads by Google