Soter IT Security deals with the forensic analysis of systems and data involved in a cyber incident. The purpose of computer forensics is to identify, acquire, preserve, analyze, document and present the information contained in computers, mobile devices (cell phones, smartphones, tablets, etc.) and computer systems in general.
During forensic analyses, it is increasingly necessary to identify, in addition to the various physical evidence, also digital evidence. In fact, computer forensics deals with collecting and analyzing the data stored in digital devices. This can be a simple data recovery or a chronological reconstruction of the activities inherent to the device analyzed. The importance of computer forensics is evident both in cases of computer crimes and in the context of civil trials.
Forensic analysis is often confused with sworn computer expertise, which is observed in Court through oath, for legal or private use. However, it is not always necessary to carry out the certification of the forensic expertise and very often it is sufficient to carry out an unsworn analysis, on plain paper, at a low cost, and only decide at a later time whether to proceed with a sworn computer forensic expertise.
Our team is available to help you understand whether in your case it is necessary to carry out an expertise or a computer forensic analysis. Contact us and we will find the solution suited to your needs.
Book a call with our team and request a consultation tailored to your business.
Book a callCo-Founder e Co-CEO
In principle, it is possible to collect any type of data obtainable from computer media. The fundamental thing in the collection of data and digital evidence is to act in full compliance with both the privacy legislation and the principles of the Workers' Statute but also respecting the maintenance of the conservation chain. We can divide the analysis into two macro-categories:
The cases in which this service can be useful are various and for each case a careful evaluation is necessary. In general the most common situations where it is necessary to recover and analyze data to be used as evidence are various such as:
Initial interview and collection of information needed to evaluate the case.
Acquisition of the requested data in compliance with the regulations and the chain of conservation. In this phase we pay the utmost attention to ensure that the data collected is not damaged or manipulated in any way, from the first moment we receive the material, until its return.
We compare the data collected with the initial requests and deliver them to the customer together with a report where the processes carried out in the collection are noted and described in detail, so that these are repeatable, in case it is necessary to demonstrate their provenance.
Relying on industry professionals is of primary importance. By relying on Soter IT Security to collect the data needed in Digital Forensics activities, you will obtain the data you need, in compliance with regulations and with all the necessary documentation. Do you need this type of analysis? Contact us, our experts will be happy to find a solution that suits you.
Do you want to prevent cyber attacks in your company and guarantee a protected infrastructure for your customers? Contact us to evaluate the security of your business's IT systems.