Computer Forensics and Incident Response


Digital forensics and incident response—for swift attention to a security breach, HR or civil/criminal litigation issue.


Our digital forensics and incident response professionals work with law firms, corporate internal audit, HR and legal departments, and others to help answer the questions:


  1. What do we do? We’ve been hacked!
  2. I’m involved in litigation―what now?
  3. I think critical intellectual property is missing. How can I be sure?
  4. How do we handle a sensitive employee matter?


When a crisis hits, you need the advice and counsel of professionals on the forefront of digital forensic examination techniques―advisors with deep knowledge of the industry and the latest trends and threats.


Our team goes far beyond data collection and malware analysis to investigating your enterprise environment and discovering digital artifacts on laptops, desktops, USB devices, smartphones, tablets, servers and cloud locations.


We understand how volatile digital evidence is and the special handling required to protect its integrity and usability for legal proceedings. In the process, we help you:


  1. Protect the evidence so it isn’t damaged, destroyed or otherwise compromised during the investigation
  2. Establish and maintain a continuing chain of evidentiary custody, and perform due diligence to confirm evidence
  3. Acquire and examine devices known or suspected to be infected with malware, without putting other systems at risk


We focus not just on the immediate fraud or security event but also on the steps needed to prevent a similar event in the future.



Why we are different?


With extensive experience and backgrounds in military, law enforcement and corporate investigations, Our professionals are qualified to provide expert consultation and/or testimony, as needed. Many team members hold industry certifications such as:


  1. EnCase Certified Examiner
  2. GIAC Certified Incident Handler
  3. Certified Forensic Computer Examiner
  4. Certified Ethical Hacker
  5. Certified Information Security Systems Professional


To simplify pricing considerations, some basic services, including data collection, preliminary searching and data extraction can be performed on a fixed-fee basis. In addition, our secure, state-of-the-art computer forensics laboratory features the latest in digital forensics, investigative software and hardware solutions.


When you suspect fraud or need computer forensic assistance, don’t wait until the trail goes cold. Call us. You’ll be glad you did.