Home |  Log In  
Forensics and eDiscovery technologies for Mac OS X, Microsoft Windows, and Linux

MacForensicsLab

$1,495.00

MacForensicsLab™ is the most powerful and cost-effective forensic tool on the market specifically designed to meet the demands of modern law enforcement and digital forensic investigators. In a world of limited resources and increasing demands, you may want more than one tool in your investigative toolbox, but you only need one; MacForensicsLab from SubRosaSoft.com Inc.

MacForensicsLab version 4.0 features a totally redesigned and streamlined interface along with many other changes and imporvements. Now examiners can run their examinations with fewer clicks and process suspect data even faster than before. Rewritten to take full advantage of the power of Mac OS X, MacForensicsLab put the power in the examiner's hands. A complete list of changes in MacForensicsLab 4.0 can be found here.

Upgrades and Pricing Details

MacForensicsLab 4.0 requires a USB authorization device different from previous versions. Users who purchased after October 20th 2011 are entitled to receive a free upgrade to version 4.0. Owners who purchased MacForensicsLab before that date can upgrade to version 4.0 at a significant discount. Please contact sales@macforensicslab.com for upgrade details or click here to upgrade.

Trial agreements are now available

If you would like to trial this solution please contact sales@MacForensicsLab.com to have a copy of the trial agreement sent to you for your signature. Please include your credentials in your email as the agreement will not be available to members of the public.

Evidentiary integrity is maintained and protected with the utmost care.

Fast, fault tolerant, verifiable acquisitions produce a reliable bit-for-bit exact replica of the original media, while maximizing data recovery, even with corrupted media. These forensic images are created with integrated segmenting and granular hashing. Inline processing allows for the creation of dual output images and associated hash files, reducing the time the forensic examiner spends in the data acquisition phase.

Featuring the most powerful data recovery engine on the market.

MacForensicsLab allows forensics professionals to find and recover deleted and embedded files - then preview and recover them. Even swap space and unallocated space can be explored for evidence. MacForensicsLab finds the evidence you need.

A multi-threaded application

Optimized for use with either industry standard SQL database servers or the built-in database engine enables investigative collaboration by allowing investigators to simultaneously access and process any given case. Logs are kept of every action performed, every item found, and freeform notes can be taken during the case to tie them all together with your thoughts during the process. These can then be exported in standardized, customizable, easy-to-share, template-driven HTML reports at any stage of the investigation. 64-bit functionality takes advantage of the newest Intel processor powered Macs for the fastest forensic investigations possible.

Advanced image analysis technologies

Allows thumbnails and previews of graphic images to be automatically filtered by skin tone content, image, and file sizes, to quickly expose suspicious material. This greatly reduces the time spent manually processing the tens of thousands of graphic images associated with every forensic examination. Files of interest can be bookmarked with a simple key stroke for more in depth analysis.

Keyword analysis and cataloging is performed in multiple languages and includes MD5, SHA-1, and SHA-256 checksum calculations. This allows the investigator to seek out items of interest across entire devices, within folders of files, and directly inside specific files. The catalog function has pattern matching for hash lists and searches for possible SSN numbers and Credit Card numbers.

Powerful auditing of the user's preferences and settings greatly reduces the time spent by the investigator collecting and collating information of evidentiary value. This enhances and speeds up the process of tying the suspect to the machine or specific actions, into a single click of the mouse. Investigators can use this function to tell what the suspect has been using and doing on their system, including Wi-Fi connections, iPods, web history and bookmarks, and general system preferences.

  • Extremely fast and verifiable media acquisition and data recovery.
  • Multiple operations/tasks can be done at the same time.
  • Perfect acquisition of devices that retain every detail of the original media.
  • The most powerful data recovery engine on the market increases the chance of recovering data, even when the drive is damaged.
  • Perform forensic acquisition and analysis on drives from Mac, MS Windows, Linux, and other operating systems.
  • Highly detailed logs to provide the investigator with as much information as possible when reporting.
  • The unique Skin Tone Analyzer and fast traversal with file filtering means you don't waste critical time searching unrelated files, allowing you to quickly find files of evidentiary value.
  • Built-in SQL database engine for speed and collaboration.

System Requirements for Macintosh:

  • System 10.4 or higher
  • Macintosh with G4, G5, or Intel processor
  • 1GB RAM
  • Second hard disk for storing recovered data
  • USB port for USB license dongle (supplied with MacForensicsLab)

Contact Information:
Website: http://www.MacForensicsLab.com
E-Mail: sales@MacForensicsLab.com

Full documentation for this product can be found by clicking here.


Add to Cart:

  • Model: 4.0
  • Manufactured by: SubRosaSoft.com Inc

Please Choose:

Discount




 | Home | 

Copyright © 2006 - 2010 MacForensicsLab Inc.
Phone +1 (510) 870-7883 - Fax +1 (510) 868 3407
Mac and the Mac logo are trademarks of Apple Computer, Inc., registered in the U.S. and other countries.

Forensics Technologies - designed to perform investigations, for law enforcement and eDiscovery professionals.

MacForensicsLab - The only effective cross-platform weapon in the war on Cyber Crime and Digital Terrorism,
with unique tools designed to combat identity theft and child pornography.