1 / 15

Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO

Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO Certified Computer Examiner Member:  The International Society of Forensic Computer Examiners. Pinpoint Labs Overview.

floyd
Download Presentation

Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO Certified Computer Examiner Member:  The International Society of Forensic Computer Examiners

  2. Pinpoint Labs Overview

  3. Insanely fast deNISTingLegal departments, forensic examiners and service bureaus use PG Pinpoint to filter custodian files (often 30-50% reduction) prior to EED processing and review. PG Pinpoint can significantly reduce production cost by deNISTing and deduplicating custodian files at a rate of 300-500 MB per minute. • Feature Highlights: • Includes more than 75 million NIST hashes • Supports MD5, SHA-1 and TIGER hash lists • Processes 300 - 500 MB per minute • Allows for customized hash lists • Identifies encrypted files • Creates forensically sound copies • Compatible with all EED and litigation support applications

  4. Electronically Stored Information (ESI) Collection Methods

  5. SafeCopy 2 was created to address the need for a forensically sound active file collection application. SafeCopy 2 has a unique bit stream copy engine that preserves file contents, timestamps and metadata while creating an electronic chain of custody using MD5 hash verification. This allows the user to collect electronic files with minimal impact on the client’s systems. • Feature Highlights: • Select from multiple data sources (i.e. file shares, individual files or file list) • Supports paths greater than 255 characters (up to 32,000) • Detects and resumes after network outages • Real time error display • 100% file copy verification (using MD5 hash comparison) • Preserves file system timestamps and metadata • Filters by file extension (inclusion, exclusion and use file extension list) • Filters by date range • Desktop, Mobile , Server and Nomad editions

  6. Electronically Stored Information (ESI) Collection Methods

  7. SafeCopy 2 Desktop Edition • Installed on the local computer • Licensed to a single system • Capable of accessing all local and networked devices

  8. SafeCopy 2 Mobile Edition • Portable between computers • Runs from U3 USB device • No installation required

  9. SafeCopy 2 Server Edition • Perfect for companies with ongoing collection needs • Freedom to use SafeCopy 2 on any computer on your network • Runs from server, external USB or NAS device • No installation required

  10. SafeCopy 2 Nomad Edition • Easily distribute temporary SafeCopy 2 license • Perfect for clients who have a one time, short term collection project • Hassle free – No USB drive or software to track or return • Runs from external hard drive, or flash drive • Create job file for automated collection

  11. SafeCopy 2 Enterprise Edition • Save money and use all of the SafeCopy 2 licenses

  12. Satisfied SafeCopy 2 Customers

  13. Microsoft Office metadata often contains relevant information for both computer forensic investigations and litigation document review. MetaDiscover allows users to quickly review extended metadata properties without using Microsoft Office. • Feature Highlights: • Access 37 Microsoft Office metadata fields • Investigate last 10 authors and locations • Uncover additional evidence sources • Scrub 2000+ documents per hour • Extract 45K+ documents per hour • Specify redaction text

  14. Software Pricing -Software (SW) -Annual Upgrade Assurance (UA)

  15. Thank You!

More Related