Identify, analyze and preserve evidence derived from computer incidents for the presentation of evidence and legal processes, providing a secure and reliable digital research service with standards and procedures endorsed nationally and internationally.
Possibility to reactively identify computer threats, industrial espionage, computer fraud, violation of privacy of the systems and unauthorized extraction of information.
- Speed in the lifting of forensic information. - Acquisition of all types of forensic digital evidence. - Availability of copies of hard disks without altering the original files in any way. - Recovery of deleted information.