Welcome to our one-stop shop for answers to frequently asked questions. If you’re doing early-stage research, or if you have questions about our products and services, you’ll probably find your answer here. But if you still don’t learn what you need to know, contact us at email@example.com. We’ll help you fill in the blanks right away.
Q: What is Forensic Scan?
Forensic Scan is a patent pending malware detection and identification solution for Microsoft® Windows® OS-based hard drives, RAID Arrays, mobile devices and storage devices.
Q: What problem does Forensic Scan solve?
Forensic Scan is designed to overcome four major malware detection and identification problems:
- Very lengthy scan times.
- Inability of standard malware engines to find all threats present on a storage device.
- Resolves the inability to run multiple malware detection engines simultaneously on the same computer.
- Recovers and scans deleted files.
Q: How does Forensic Scan work?
Forensic Scan performs three tasks:
- It confirms whether the data on your storage device is infected.
- If your device is infected, Forensic Scan classifies the threat as a virus, malware, trojan or rootkit.
- Forensic Scan then identifies which specific malicious threat is responsible and which malware detection engine can neutralize the threat.
Q: How is Forensic Scan different than other solutions?
Many malware detection and identification solutions scan files or entire storage devices. Existing commercial solutions scan devices with only a single malware detection engine at a time. Forensic Scan technology simultaneously scans your storage device with commercially available malware detection engines using the most current malware signatures known to the malware detection community.
Specifically, Forensic Scan uses this unique combination of capabilities:
- Scans entire hard drives, RAID arrays or storage devices.
- Recovers, scans and analyzes data from deleted files.
- Simultaneously scans with more than 55 malware detection engines without creating software conflicts that stop the scan process.
- Scans for all current threat signatures known to the malware detection community.
Q: You claim that Forensic Scan is more reliable than other solutions. Define reliability.
Reliability is the assurance that when we start a scan, it will scan quickly, without errors or software conflicts that make the process stop.
This assurance is based on our patented hardware-software technology, which avoids self-neutralization of malware detection software being run simultaneously. That means that when we scan with more than 55 malware engine at once, none of them react to the others as if they were viruses or malware.
Q: What do you mean when you say that Forensic Scan is cost-effective?
Cost-effectiveness recognizes that when cyberattacks occur, the longer the recovery, the higher the total costs. These can be direct IT-related costs, for example, IT assets and labor costs, or direct and indirect costs such as business disruption, damage to shareholder value or damage to an organization’s brand.
Forensic Scan solutions help organizations avoid or reduce measurable IT and business recovery-related costs and reduce intangible costs by getting back to business quickly and effectively.
Q: How much do Forensic Scan services cost?
Malware detection and identification professional services in our secure forensic laboratory are based on:
- Turnaround time.
- Number of valid and non-deleted files scanned and size of storage device.
- Number of malware detection engines used.
- Number of storage devices scanned at one time or on a monthly or quarterly basis.
On-site analysis fees are based on:
- Rental period based on a flat monthly or per incident rate.
- Number of storage devices scanned.
- On-site consulting forensic analyst: Flat fee per engagement plus expenses.
Q: Handing over a device with our critical information on it makes me nervous. How do your processes assure proper handling and frankly, my peace of mind?
We’re aware that you need to know that your information assets are secure throughout the scanning and reporting process. That’s why each Forensic Scan engagement includes these services:
- Encrypted copies of your duplicate storage device. First, you make a duplicate of your storage device and send it to our secure forensic laboratory in the southeastern part of the USA. Then, we make a forensic image (an encrypted duplicate copy) of your duplicate storage device. That’s what we work on. We don’t work on or analyze the duplicate storage device you send us in any way.
- Secure forensic laboratory. All professional services are performed at our secure forensic laboratory.
- Expert supervision. The end-to-end scanning process is supervised and monitored by a senior forensic security consultant.
- Comprehensive presentation. When the analysis is complete, we send you a Microsoft PowerPoint presentation that identifies complete scan results of each malware detection engine. For each engine, we create a screen shot, which shows what was found – if a malicious threat is detected. Each screen shot is a slide in the presentation. You decide what process you will use to eradicate the threat based on your organization’s incident response protocols.
- Door-to-door delivery of your storage device and test results via secure overnight courier.
Q: Scans that are 50 percent faster than the competition are impressive. But, what advantage is speed to my business?
The more time it takes to recover from cyberattack, the more expensive and difficult is your recovery. Faster scans translate into faster recovery. With Forensic Scan malware detection services, you can achieve:
- A faster answer to the technical problem. That means faster detection of viruses, malware, trojans and rootkits and faster identification of malicious threats and compromised data.
- More time to take control and get a better understanding of the problem.
- More time to plan and implement an effective response.
Q: What types of business value does Forensic Scan provide the business side of my organization?
Business leaders can use Forensic Scan to:
- Reduce the loss of critical business information.
- Reduce direct and indirect recovery costs.
- Return to normal work activity more quickly – in other words, reduce worker downtime.
- Spend less time reacting to the crisis, more time planning a response.
- Get a faster, more thorough and accurate understanding of the problem.
- Reduce intangible damage—business disruption and damage to your brand.
Q: What types of business value does Forensic Scan provide the IT side of my organization?
Technical decision makers and IT professionals can use Forensic Scan to:
- Get faster and more comprehensive threat detection.
- Get an accurate, reliable picture of malicious threats.
- Reduce or avoid IT-related recovery costs.
- Return your IT team to value-added work that supports the business side of your organization.
- Gain esteem of business leaders due to your quick and effective response to the problem.
Q: What types of methods and tools do you use to develop Forensic Scan?
Although we get powerful results, we don’t use anything exotic or new to get them. Instead, we use methods and tools familiar to forensic computing professionals. Forensic Scan technology operates on Microsoft® Windows®-based systems and uses Microsoft C++ methods and tools.