Secure hard drive replication for forensic analysis
Posted on 12 September 2011.
Ciphertex Data Security announced its new Ranger-COP family (Ciphertex Optimized Protection), a compact pair of products that combine AES 256-bit hardware-based encryption with up to 15 Terabytes of capacity, designed with rugged portability for plug, play and simplified replication of computer system hard drives for full forensic review.


When law enforcement seizes a computer suspected of criminal activity, they need to conduct a full capture of the hard drive to check for fraudulent transactions, web site histories, evidence of hacking, changed and deleted files and pirated content. In addition, today's forensic software can ascertain deleted or changed files and identify evidence of criminal activity, child pornography and evidence of sexual predators targeting minors.

The Ranger-COP easily plugs into any computer, works seamlessly with all leading forensic software applications and in any sort of physical environment to securely replicate the target hard drive(s) for subsequent forensic analysis.

Key features include:
  • AES 256-bit hardware encryption
  • Key-based encryption
  • Fast eSATA interface (300MB/sec)
  • Pluggable interface modules
  • Free NovaBACKUP software for automatic backup to the portable Ranger-COP.
"Ciphertex has worked closely with the law enforcement community to ascertain the features and functionality for secure storage solutions they need to more effectively capture and securely store data in order to properly conduct forensic investigations," said Jerry Kaner, president and CEO of Ciphertex. "We believe the Ranger-COP's combination of ease of use with military grade encryption and high capacity storage maintains the integrity of the replicated evidence to help convict cybercriminals of a broad range of computer crime."





Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //