The field of computer forensics has grown and expanded exponentially over the last few years. We at The Saturn Partners, Inc. have formed a special service area for computer and network forensics, to address the need to gather sensitive and critical electronic and physical evidence to research and prosecute any scenario in the network environment.
Clients in the legal environment are especially in need of knowledge and resources, such as The Saturn Partners, Inc. to help isolate, gather, protect and encapsule sensitive electronic evidence for prosecution. In addition, every area of industry deals with employee theft, wrongful termination lawsuits as well as the ever present need to follow certain guidelines when collecting evidence to present in the courtroom.
The Saturn Partners, Inc can bring experienced forensics personnel to your environment to perform the essential steps listed above to protect electronic evidence and prepare it for analysis and prosecution.
It is only in recent years the judicial system has addressed this urgent issues and has provided guidelines for collection and presentation of important electronic evidence, and The Saturn Partners, Inc. uses a system of precise steps to examine and isolate the compromised areas, and conduct an complete forensics examination to guide the client from start to finish in the gathering, analysis and presentation of electronic evidence.
When a data breach event occurs, your company has a very short time to gather evidence, not just for restoring systems, but also gathering information for prosecuting the crime in court if need be. Internal IT resources are sometimes forced to act the role of "first responder;" such personnel untrained in computer forensics can do more harm than good in their efforts to assist, damaging or mishandling critical evidence.
At The Saturn Partners, we have extensive experience conducting digital media analysis and computer forensics using forensic software and protocols for the purpose of data collection and preservation in the event of a breach. We handle evidence with state of the art methodology, using processes and tools which support proper case law.
With The Saturn Partners, you’ll have quick and definitive insight into the root-cause of the incident, as well as the extent to which your data was compromised. Our cyber crime incident response teams examine both physical and digital evidence to uncover important information about your data security incident, including:
- When did the security breach occur? Is it still happening?
- Where did it originate – internally or externally?
- How and why did the incident occur? For example, did a malicious intruder exploit their network access privileges to steal your data for financial gain, or did an employee accidentally disclose sensitive information via email?
- What was compromised – intellectual property, personal data, network operations, etc.?
Our cyber investigations experts can determine whether digital evidence was erased or modified, uncover data history, recover data, recreate events and exchanges, search for keywords and dates, and authenticate data files. We combine computer forensic expertise with traditional investigative techniques, such as interviews and surveillance, to retrace the behavior of people who had access to protected information and identify security vulnerabilities, whether they exist in your network infrastructure or policies and procedures.
We’ll work closely with general counsel, senior executives, audit committees, or outside counsel at each stage to explicate forensics data and assure your objectives are met. If requested, we can assemble a case file for referral to a regulator or law enforcement agency.
As a leading provider of high-end incident response services, The Saturn Partners, Inc. has the ability to perform disk and memory forensics, and to provide an incident-manager to organizations without a dedicated IR team. Our experience includes fighting intrusions against large, critical infrastructures and defending against Advanced Persistent Threats (APT). Among our areas of expertise are the following:
- Pre-trial independent analysis
- Computer forensics and electronic discovery
- Expert testimony
- Digital discovery and data recovery
- Memory, kernel and disk analysis of custom malware and rootkits
- Analysis of hard drive images that may have been compromised
- Analysis of possible suspicious user and system actions
- Analysis of abnormal network communication