UBM: TECH DIGITAL RESOURCE LIBRARY

AccessData Group

AccessData Group has pioneered digital investigations and litigation support for more than 25 years. Its family of stand-alone and enterprise-class solutions, including FTK, SilentRunner, Summation and the CIRT security framework, enable digital investigations of any kind, including computer forensics, incident response, e-discovery, legal review, compliance auditing and information assurance. More than 100,000 users in law enforcement, government agencies, corporations and law firms worldwide rely on AccessData software solutions and premier digital investigation and hosted review services. AccessData is also a leading provider of digital forensics and litigation support training and certification.

Our Website: http://www.accessdata.com


Latest Content From AccessData Group

Webcast: Innovations in Integration: Achieving Holistic Rapid Detection and Response

by AccessData GroupSep 26, 2013

Detection and response times are a joke. According to the 2013 Data Breach Investigations Report, 66% of reported incidents weren’t discovered until months after the fact, 69% were actually discovered by third-parties, 14% of incidents took weeks or more to contain and 22% took months or more to contain.Lofty talk of people, processes and information sharing has its place, but we won’t see our security posture improve until weaknesses in the underlying cyber security infrastructure are


Whitepaper: What You Don't Know Can Hurt You: Detecting Unknown Threats and Reducing Response Times

by AccessData GroupJun 19, 2013

Protecting enterprise operations from hacks, malware, targeted attacks, advanced persistent threats (APTs) and other malicious activity remains a challenge for organizations, large and small. The number of breaches continues to grow and shows no signs of slowing despite technology advances and a market flush with cybersecurity products. In fact, according to the 2013 Verizon Data Breach Investigations Report (DBIR), 66 percent of surveyed organizations didn't discover security breaches until


Whitepaper: Cerberus: Malware Triage and Analysis

by AccessData GroupOct 29, 2012

This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this �triage� approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of


Whitepaper: A Balanced Approach:The Shift to Integrated Security Response Capabilities White Paper

by AccessData GroupApr 23, 2012

Despite increased regulation, oversight and spending, corporate and government organizations continue to see an increase in cyber security breaches. According to the October 2011 GAO Information Security report, there's been a 650% increase in federal government security incidents over the last five years. And corporate incidents have gone up, not only due to the infiltration of mobile devices - both corporate-owned and employee-owned - but computer-based as well. In an interview on March 28,