Forensics Visualisation Toolkit

Perform forensic analysis using advanced visualisations based on time and correlation patterns

View demo

Forensics Service


A complete service to help investigators
analyse cyber security events and understand their cause.

Advanced Visualisation Tool

Interconnected and easy to use interface that allows seamless exploration and drilling down in underlying data.

Real Time Log analysis

Easy connection to a number of logs found in your system and visualisation of the key points.

Threat Hunting

Detect threats and proactively isolate them and prevent incidents in your network.

Correlation Mechanism

Identify patterns and relationships between events and actions taking place in your infrastructure.

Monitoring

Use our set of agents to actively monitor critical assets and analyse current system status.

Integration

The forensics toolkit comes with connectors to existing SIEM and HIDS/NIDS software.

Forensic Service Deployment Steps


Read about the major steps required
to have a working real-time forensic toolkit deployed.

1. Network Topology

Identification of current infrastructure and configuration of the tools accordingly.

2. Identification of CIPIs

Critical Infrastructure Performance Indicators (CIPIs) must be identified and monitored.

3. Deployment of Forencic Agents

CIPIs are collected by relevant agents installed on the monitored systems.

4. Deployment & Configuration of the Visualisation Toolkit

Required middleware and communication configuration.

5. Connection with existing systems

SIEM and HIDS/NIDS software can provide input to the forensic toolkit.

6. Visualisation installation and testing

The Visualisation application can be installed locally or in the cloud.

Our Introductory Video

Take a quick look of the forensics visualisation tool in 2 mins