Faster Digital Forensic Analysis

Examining seized computers and devices for incriminating evidence is a slow and time-consuming process. Searching seized computers consumes valuable working time and delays the availability of evidence. Scanning through seized computers often delays an investigation and can cause an  accumulation of unfinished work in digital forensic labs.

Cyan Forensics, a startup based in Edinburgh, Scotland, whose technology helps police investigators to find evidence faster, has secured a €1.5 million additional funding from a consortium of investors and is now developing a new set of digital forensic tools capable of scanning devices in a matter of minutes. 

The software also helps accelerate processing, it can prioritise the analysis of devices that are known to contain illegal files.
The company’s software allows investigators to make quick and confident decision and helps prevent further crime ranging from terrorism to human trafficking. Within a matter of minutes, Cyan’s solution will be able to supply an investigator with enough evidence to confront suspects and know where to focus a full forensic investigation. 

Automated scans using MD5 hashes of known illegal content, such as illegal images of children or terrorist handbooks, are a valuable tool for finding evidence quickly and minimising the need for forensic analyst time. Such scans take many hours, or even days on devices with high capacity storage or slow external interfaces.

The company’s website mentions that the technology works in three steps. The first step is the preparation stage, where the system extracts relevant information from a database. 

So if the investigation is a terror investigation, the system will extract bomb-making guides or terrorist manifestos from the database. If a child sexual exploitation case is being investigated, then the extracted data from the database will likely be illegal images.

The next stage is the triage stage. The system is capable of filtering out files that almost definitely do not contain any contraband. This allows the system to scan seized computers, devices, and hard drives within minutes. 

When traditional scanning methods would take 35 minutes to scan an 80 gigabyte hard drive, Cyan Forensics’ system would only take two minutes to scan. Similarly, it would take Cyan only 27 minutes to scan a terabyte of data, where it will take traditional scanners over 7 hours to scan.

The Cyan system provides tools that show rapid results allowing analysts to focus their investigative efforts on devices that are likely to contain incriminating evidence.The system provides investigators with a useful set of tools that help stop criminals and solve crimes.

Cyan Forensics:         EU Startups:        I-HLS

You Might Also Read: 

Authenticating Digital Evidence:

 

 

 

 

« Attack Vectors Are Proliferating
US Government Cyber Security Still Needs Work »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Matrium Technologies

Matrium Technologies

Matrium Technologies has been a leading provider of technology solutions since 1991, with a strong industry background in Network Testing, Network Visibility and Security.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.

OmniIndex

OmniIndex

OmniIndex PostgresBC is the only commercial solution allowing you to keep your most sensitive and critical data encrypted while analyzing it. Structured and unstructured.

Tosibox

Tosibox

Tosibox mission is to Safeguard Critical OT Environments with a Purpose-Built Cybersecurity Platform.