GDF provides both large and small businesses with a wide variety of computer forensics services, such as data acquisition, data recovery and evidence gathering. We understand each client has different needs and each case is unique. We have assisted corporate security with the analysis of laptop systems once issued to employees suspected of Intellectual Property (IP) theft. In South America, we assisted clients to track and quantify risks and exposure to hacking events. In Germany, former employees suspected of transmitting corporate data to competitors could not hide from GDF forensics technicians. In the United States, GDF has successfully handled hundreds of computer forensics engagements for companies ranging from the Fortune 10 to small accounting and manufacturing firms. Our experience in corporate-centric computer forensics allows us to efficiently and professionally serve our business clients while consistently delivering the highest quality work product in the industry. We encourage you to contact us at 1-800-868-8189 if you have questions about how we may assist you.
Computer Forensics Services
GDF is experienced in identification, recovery, and analysis of Electronically Stored Information (ESI) to prove what happened, when it happened, how it happened and who was involved.
What GDF can do for you?
GDF can provide electronic data acquisition, searching, filtering and consolidation of data, including emails, latent data and files from virtually any type of media, including hard drives, backup tapes, CD-ROMs, USB storage devices, Zip disks and complex server environments, among others.
Our complete link analysis and correlation of unstructured data can be used to build timelines and relationships of entities involved, giving new insight to the chain of events relating to a matter. While analyzing unstructured data, like documents and emails, has traditionally been a labor intensive task, GDF has developed methodologies and tools to expedite the process, thereby reducing the time required as well as the cost, without sacrificing precision and quality.
Electronic exit interviews conducted on employee workstations and data obtained from corporate servers ensure compliance and lower risk. Just as interviewing an exiting employee and gaining an understanding of the reasons for departure, as well as gathering information required to be archived for compliance, Human Resource departments have engaged GDF to image and archive employee systems. This allows the data on the employee’s system to be retrieved at any time and ensures the integrity of the data contained on the system should it become needed in the future.
Certified forensics technicians are skilled at acquiring and delivering data from hostile environments. While most engagements GDF handles for clients are in a friendly or controlled environment, GDF technicians are experienced in working with IT departments and corporate security to acquire and archive data in less "friendly" situations.
Emergency Response Teams
Under a Service Level Agreement (SLA), with no cost upfront or hourly charges unless a team responds, GDF can provide Emergency Response Teams (ERTs) that can be deployed and onsite within hours in most major metropolitan areas and are guaranteed to arrive on site with 12-24 anywhere in the world. Our network of responders are highly trained and strategically located to maximize response times. By having GDF standing by to respond to IT incidents, we help put organizations into compliance with legislation like Sarbanes Oxley (SOX) as well as FDIC, OCC and SEC regulations. Our no-cost-to-contract philosophy allows for the implementation of a standby team ready to respond without having to pay upfront retainers or costs for services that may never be used. But should an incident arise requiring a response, our clients simply contact the national call center, give details and location of the incident, and an Emergency Response Team will be dispatched as soon as possible.
GDF’s areas of expertise are digital data recovery, cyber security and electronic discovery (eDiscovery), including employee and industrial sabotage, intrusion detection, falsification of company records, asset tracking, violations or breaches of company policy, vendor information (key contacts, contract rates, expiration dates) employee lists (names, addresses, SSNs), embezzlement (money or plans), credit card cloning or theft, identity theft, software piracy, sexual harassment via email, instant messaging and other forms of electronic communications, monitoring employee activity, recovery of deleted files, lost password recovery and cracking of locked files, discovery of hidden and deleted emails, pictures, Internet usage and unauthorized software installed on a company , removal of viruses, software and other data items which may be hidden from the user.