Magnet Axiom Computer
Sku: HTI048
Short description: Magnet AXIOM Computer is a specialized application that automates, simplifies the task of collecting, analyzing, arranging, linking data to help control electronic digital inspection. Examination takes place as quickly, simply, and accurately as possible.
Product information
In today’s world, nearly all crimes involve smartphone, tablet, computer or cloud evidence. In the process of handling cases involving electronic computers, there will always be difficulties and challenges with the forces of electronic digital investigation and inspection when the performers of acts are always deliberately concealed. or destroy evidence related to the case on such devices. Recovering, analyzing and finding valuable data is always one of the current leading tasks of electronic digital investigation and inspection..
Therefore, Magnet Forensics has launched the MAGNET AXIOM COMPUTER, a specialized software that automates, simplifies the task of collecting, analyzing, arranging, linking data to help control electronic digital inspection and examination takes place as quickly, simply and accurately as possible.
Main features of Axiom Computer Magnet data extraction and analysis software:
DATA ANALYSIS AND ACQUISITION
- AXIOM COMPUTER is built to collect image files of storage devices and has the ability to create image files of almost all existing data storage devices. During the implementation process, AXIOM COMPUTER will duplicate the content of the equipment to be processed and manipulate on the duplicated data to ensure the data integrity of the original data.
- Analysis of cloud service data including iCloud, Google, Facebook, Twitter, Instagram
- Analyzing data on system of Linux, OS X, Windows
- Collecting evidence photos from platforms across multiple operating systems
- Accessing data in the file system, registry and evidence types
- Identifying key keyword ranges and starting investigating with one click
- Using artificial intelligence to automatically identify and search potential images such as nudity, weapons, or drugs
- Using artificial intelligence to identify and search for conversations related to child sexual abuse
- Connecting, automatically exploring, discovering and presenting the relationships between evidence and files
- Ability to reverse access to the location of the evidence source
DATA RECOVERY
- Process and recover 1000+ artifacts
- Find more chat, picture and browser history data and review multiple evidence sources in a single case
- Recover and Analyze memory in AXIOM with Volatility
- Simplify investigations by using artifacts to recover evidence from disk and memory
REPORTING
- Collaborate and share results with non-technical stakeholders
- Investigators can work together by adding tags, comments and bookmarks to evidence in Portable Case
- Evidence is presented in easy to understand formats e.g., rebuilding texts in the chat bubble format
- Collect data and comparisons to upload to the system