Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

FTK Forensic Toolkit

FTK is a digital investigations solution built for speed, stability and ease of use. It quickly locates evidence and forensically collects and analyzes any digital device or system producing, transmitting or storingdata by using a single application from multiple devices.

Full-Disk Forensic Images
Create full-disk forensic images and process a wide range of data types from many sources, from hard drive data to mobile devices, network data and Internet storage, all in a centralized, secure database. FTK® processes and indexes data upfront, eliminating wasted time waiting for searches to execute. Cut down on OCR time by up to 30% with our efficient OCR engine.

Decrypt Files & Crack Passwords
Decrypt files, crack passwords, and build reports with a single solution. Recover passwords from over 100+ applications. Decrypt a computer drive encrypted by the latest version of McAfee Drive Encryption and features L01 export support, which eases the workflow of users when data must be used within multiple tools.

Parse Registry Files
Parse registry files and Windows system information files in an easy to read, interactive and reportable tab. Label, bookmark and export individual objects per category, allowing for easy searching, filtering and reporting.

Locate, Manage and Filter Mobile Data
Locate, manage and filter mobile data more easily with a dedicated mobile tab. Use the message application filter to quickly isolate data from message applications like WhatsApp or Facebook.

Collect, Process and Analyze Datasets Containing Apple File Systems
Collect, process and analyze datasets containing Apple file systems that are encrypted, compressed or deleted. FTK® Supports decryption of File Vault 2 from the APFS file system, as well as importing and parsing of AFF4 images created from Mac computers

Visualization Technology
Visualization technology that helps you get a clearer picture of events by displaying your data in timelines, cluster graphs, pie charts, geolocations, and more. Dig deeper and view all EXIF data, including location, make and model of the device used to capture images or video

Rating
500
0 vote
Favoured:
0

Listing Details

Vendor
Exterro
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2022-08-15
Owner
michelemjordan
Add'l Info
Win32 & Win64
Created
2003-03-28
  • 1391.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
    • - Anti Forensic Tools
    • - Forensic Toolkits
    • - Forensic Tools
    • - Network Forensic Tools
    • - Remote Forensics
    • - Porotocol Analyzers
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message