Faster Digital Forensic Analysis

Examining seized computers and devices for incriminating evidence is a slow and time-consuming process. Searching seized computers consumes valuable working time and delays the availability of evidence. Scanning through seized computers often delays an investigation and can cause an  accumulation of unfinished work in digital forensic labs.

Cyan Forensics, a startup based in Edinburgh, Scotland, whose technology helps police investigators to find evidence faster, has secured a €1.5 million additional funding from a consortium of investors and is now developing a new set of digital forensic tools capable of scanning devices in a matter of minutes. 

The software also helps accelerate processing, it can prioritise the analysis of devices that are known to contain illegal files.
The company’s software allows investigators to make quick and confident decision and helps prevent further crime ranging from terrorism to human trafficking. Within a matter of minutes, Cyan’s solution will be able to supply an investigator with enough evidence to confront suspects and know where to focus a full forensic investigation. 

Automated scans using MD5 hashes of known illegal content, such as illegal images of children or terrorist handbooks, are a valuable tool for finding evidence quickly and minimising the need for forensic analyst time. Such scans take many hours, or even days on devices with high capacity storage or slow external interfaces.

The company’s website mentions that the technology works in three steps. The first step is the preparation stage, where the system extracts relevant information from a database. 

So if the investigation is a terror investigation, the system will extract bomb-making guides or terrorist manifestos from the database. If a child sexual exploitation case is being investigated, then the extracted data from the database will likely be illegal images.

The next stage is the triage stage. The system is capable of filtering out files that almost definitely do not contain any contraband. This allows the system to scan seized computers, devices, and hard drives within minutes. 

When traditional scanning methods would take 35 minutes to scan an 80 gigabyte hard drive, Cyan Forensics’ system would only take two minutes to scan. Similarly, it would take Cyan only 27 minutes to scan a terabyte of data, where it will take traditional scanners over 7 hours to scan.

The Cyan system provides tools that show rapid results allowing analysts to focus their investigative efforts on devices that are likely to contain incriminating evidence.The system provides investigators with a useful set of tools that help stop criminals and solve crimes.

Cyan Forensics:         EU Startups:        I-HLS

You Might Also Read: 

Authenticating Digital Evidence:

 

 

 

 

« Attack Vectors Are Proliferating
US Government Cyber Security Still Needs Work »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

CYSEC Academy

CYSEC Academy

CYSEC Academy offer cyber certifications, cyber assurance and cyber defense training, hands-on learning training modules, public, private and bespoke training courses.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

UNS Inc.

UNS Inc.

UNS is a top services partner for multiple leaders in the global cybersecurity industry – we do business in 40 countries, including the United States, Canada, Chile, and Colombia.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.