Forensics Analysis Investigation

Digital data collection for forensic analysis
Contact Us

Soter IT Security deals with the forensic analysis of systems and data involved in a cyber incident. The purpose of computer forensics is to identify, acquire, preserve, analyze, document and present the information contained in computers, mobile devices (cell phones, smartphones, tablets, etc.) and computer systems in general.

What is computer forensics


During forensic analyses, it is increasingly necessary to identify, in addition to the various physical evidence, also digital evidence. In fact, computer forensics deals with collecting and analyzing the data stored in digital devices. This can be a simple data recovery or a chronological reconstruction of the activities inherent to the device analyzed. The importance of computer forensics is evident both in cases of computer crimes and in the context of civil trials.

Difference between computer expertise and forensic analysis


Forensic analysis is often confused with sworn computer expertise, which is observed in Court through oath, for legal or private use. However, it is not always necessary to carry out the certification of the forensic expertise and very often it is sufficient to carry out an unsworn analysis, on plain paper, at a low cost, and only decide at a later time whether to proceed with a sworn computer forensic expertise.

Our team is available to help you understand whether in your case it is necessary to carry out an expertise or a computer forensic analysis. Contact us and we will find the solution suited to your needs.

Do you need to recover important data from a device?
Do you need to find and collect computer evidence?

Book a call with our team and request a consultation tailored to your business.

Book a call
profile image
with Pierdomenico Bodda

Co-Founder e Co-CEO

What data can be collected?


In principle, it is possible to collect any type of data obtainable from computer media. The fundamental thing in the collection of data and digital evidence is to act in full compliance with both the privacy legislation and the principles of the Workers' Statute but also respecting the maintenance of the conservation chain. We can divide the analysis into two macro-categories:

  • Disk forensics: Acquire and analyze hard storage media, i.e. hard disks, computers, notebooks, USB sticks, servers, CDs, DVDs.
  • Mobile forensics: Acquisition and analysis of mobile devices such as phones, tablets, smartphones, smartwatches.

When is it useful?


The cases in which this service can be useful are various and for each case a careful evaluation is necessary. In general the most common situations where it is necessary to recover and analyze data to be used as evidence are various such as:

  • Cracking,
  • Spamming,
  • Online scams,
  • Phishing,
  • Infringement of privacy,
  • Stalking,
  • Insults and defamation,
  • Computer fraud,
  • Theft and reuse of company data,
  • Data breach,
  • Ransomware attacks,
  • Copyright violations,
  • Unauthorized access,
  • Computer damage.

How is computer forensics performed?

  1. Preliminary phase

    Initial interview and collection of information needed to evaluate the case.

  2. Chain of conservation

    Acquisition of the requested data in compliance with the regulations and the chain of conservation. In this phase we pay the utmost attention to ensure that the data collected is not damaged or manipulated in any way, from the first moment we receive the material, until its return.

  3. Data analysis and delivery

    We compare the data collected with the initial requests and deliver them to the customer together with a report where the processes carried out in the collection are noted and described in detail, so that these are repeatable, in case it is necessary to demonstrate their provenance.

Soter: Your Ally for Digital Forensics


Relying on industry professionals is of primary importance. By relying on Soter IT Security to collect the data needed in Digital Forensics activities, you will obtain the data you need, in compliance with regulations and with all the necessary documentation. Do you need this type of analysis? Contact us, our experts will be happy to find a solution that suits you.

Request a consultation

Do you want to prevent cyber attacks in your company and guarantee a protected infrastructure for your customers? Contact us to evaluate the security of your business's IT systems.