The ability to forensically detect whether or not departing employees are leaving with sensitive company information or intellectual property.

  • Defensible Evidence preservation.
  • Menu-based analyses, with tiered levels of detail, including:
    • Computer basics.
    • Data Exfiltration Evidence.
    • Deletion / Wiping Evidence.
    • Recovery / parsing of “private” communications.
    • Focused keyword searches of forensic drive images.
    • Focused keyword searches of locally-stored email content on the computer.
    • Internet browser history / artifacts.
  • Easy to interpret reporting.
  • The ability conduct these analyses through a predictable and cost-effective process.