Faster Digital Forensic Analysis

Examining seized computers and devices for incriminating evidence is a slow and time-consuming process. Searching seized computers consumes valuable working time and delays the availability of evidence. Scanning through seized computers often delays an investigation and can cause an  accumulation of unfinished work in digital forensic labs.

Cyan Forensics, a startup based in Edinburgh, Scotland, whose technology helps police investigators to find evidence faster, has secured a €1.5 million additional funding from a consortium of investors and is now developing a new set of digital forensic tools capable of scanning devices in a matter of minutes. 

The software also helps accelerate processing, it can prioritise the analysis of devices that are known to contain illegal files.
The company’s software allows investigators to make quick and confident decision and helps prevent further crime ranging from terrorism to human trafficking. Within a matter of minutes, Cyan’s solution will be able to supply an investigator with enough evidence to confront suspects and know where to focus a full forensic investigation. 

Automated scans using MD5 hashes of known illegal content, such as illegal images of children or terrorist handbooks, are a valuable tool for finding evidence quickly and minimising the need for forensic analyst time. Such scans take many hours, or even days on devices with high capacity storage or slow external interfaces.

The company’s website mentions that the technology works in three steps. The first step is the preparation stage, where the system extracts relevant information from a database. 

So if the investigation is a terror investigation, the system will extract bomb-making guides or terrorist manifestos from the database. If a child sexual exploitation case is being investigated, then the extracted data from the database will likely be illegal images.

The next stage is the triage stage. The system is capable of filtering out files that almost definitely do not contain any contraband. This allows the system to scan seized computers, devices, and hard drives within minutes. 

When traditional scanning methods would take 35 minutes to scan an 80 gigabyte hard drive, Cyan Forensics’ system would only take two minutes to scan. Similarly, it would take Cyan only 27 minutes to scan a terabyte of data, where it will take traditional scanners over 7 hours to scan.

The Cyan system provides tools that show rapid results allowing analysts to focus their investigative efforts on devices that are likely to contain incriminating evidence.The system provides investigators with a useful set of tools that help stop criminals and solve crimes.

Cyan Forensics:         EU Startups:        I-HLS

You Might Also Read: 

Authenticating Digital Evidence:

 

 

 

 

« Attack Vectors Are Proliferating
US Government Cyber Security Still Needs Work »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

SmartSearch

SmartSearch

SmartSearch is a leading online provider of Anti-Money Laundering and Fraud Prevention Services.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

SixThirty CYBER

SixThirty CYBER

SixThirty is a venture fund that invests in early-stage enterprise technology companies from around the world building FinTech, InsurTech, and Cybersecurity solutions.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

CNNECT

CNNECT

CNNECT are specialists in cloud, collaboration and cybersecurity, constantly evolving the way in which we understand, advise and deploy these technologies

CodeShield

CodeShield

CodeShield is a SaaS that helps software developers and security teams secure IAM in the public cloud. With us, you detect IAM privilege escalations easily and achieve least privilege.