AccessData® Enterprise takes network-enabled digital investigations to the next level. Built on our industry-standard, court-accepted Forensic Toolkit® technology, AD Enterprise delivers state-of-the-art incident response and deep dive analysis of both volatile and static data. An intuitive incident response console, secure batch remediation, unsurpassed searching and filtering, and comprehensive logging and reporting are just a few of the reasons AD Enterprise is the investigative tool of choice among government agencies and Fortune 500 companies.
The ability to forensically analyze multiple computers across your enterprise simultaneously is critical when performing root cause analysis and internal investigations. Furthermore, proactive use of this technology allows you to detect threats that have circumvented the typical signature-based tools, such as antivirus, intrusion detection and other alerting systems.
Detect, Analyze and Remediate Malware, Advanced Persistent Threats and Zero-Day Events
Proactively or reactively scan thousands of computers identify rogue processes (even those that are hidden) and anomalous activity. Analyze the compromise to understand how it operates, conduct a network-wide compromise assessment to identify all affected nodes AND remediate all compromised computers from a central location.
Detect and Stealthily Investigate Fraud, Data Theft and Other Employee Misconduct
AD Enterprise gives you visibility into all activity on your employee computers, network shares and peripheral devices. Investigative tasks will continue to be performed, whether suspect employees are logged into your network or not…. whether they are online or not… and information will be sent back to you every time they go online.
Facilitate Regulatory Compliance
Visibility into desktops, laptops, peripheral devices and network shares allows you to maintain compliance with regulations, such as Sarbanes-Oxley, PCI requirements, HIPAA, FISMA, and internal policies.
Detect and Quickly Respond to Unapproved Application Use
Scan thousands of machines for unapproved processes, and if policies allow, IT personnel with the proper credentials can simply right-click to kill a specific process or schedule a batch remediation to quickly remediate thousands of computers running unapproved or unknown applications.
The Most Comprehensive and Effecient Enterprise-class Computer Forensics Software
A Secure, FIPS 140-2 Certified Solution
Powerful Incident Response Software, Including Deep Analysis of All Live Processes
Ease of Use, Stability and Process-oriented Workflow
© 2013 complexbiz. Todos los derechos reservados. la información y gráficas contenidas en este sitio provienen de los fabricantes.