esureity.com Welcome to eSureITy - Post Incident Forensics Support

 

home

Post Incident Forensics Support

When your information assets have been compromised, time is of the essence. eSureITy uses computer investigation processes that have been optimized to integrate computer science and forensic science. These processes are in use by virtually every major law enforcement agency in the United States and Canada, and have never been successfully challenged in court.

Providing a quantifiable measurement of authenticity and integrity of data is essential for satisfying admissibility standards such as Federal Rules of Evidence - Article X - Rule 1003 and Article IX - Rule 901. The data acquisition and authentication protocol employed by our team has been developed to facilitate the discovery process and addresses issues raised in Federal Rules of Civil Procedure, Rules 26 and 34. eSureITy integrates digital evidence and chain of custody information and extends the authentication paradigm to include an embedded chain of custody information.

More than simply recovering deleted files, our methods allow us to defeat passwords, discern subtle patterns of computer usage and much more. Reconstructing an accurate history of computer activity and identifying the “signature” of user initiated actions requires an in depth understanding of computer operating systems, file systems and disk storage subsystems.

eSureITy employs a standardized scientific methodology that has been proven to be sound, effective and reliable. Methodology includes the following:

  • Information concerning each phase of the engagement is kept in the strictest confidence.
  • No potential evidence will be damaged, destroyed or compromised by the processes used to investigate the computer or drive.
  • No malicious software is introduced to the system during the analysis of the computer or drive.
  • Extracted information with even the most remote evidentiary value is properly handled and protected from later mechanical or electromagnetic damage.
  • A continuing chain of custody is established and maintained.

 

Learn More    |    Back to top