Follow Us:

BTB Security conducts analysis of digital evidence using special software, techniques, and procedures. We can deploy resources to capture evidence or seized evidence may be shipped to us for examination. We will conduct a thorough analysis and provide a detailed report outlining the process that was followed and evidence found. Analyses of this type often support investigations that rely on evidence surrounding the following activities:

  • Web sites that have been visited
  • Files that have been downloaded
  • When files were created, modified, and last accessed
  • Whether attempts have been made to conceal or destroy evidence
  • Whether attempts have been made to fabricate evidence

We conduct forensic analysis of evidence for civil and criminal cases, investigation of company computers to determine employee activity, and preparation of electronic discovery requests.

How secure is your organization?

Speak with an information security expert to find out.