We’re Coming Back to Nashville for Magnet User Summit 2023!
We’re excited to announce that we’re coming back to Music City for Magnet User Summit 2023!
We’re excited to announce that we’re coming back to Music City for Magnet User Summit 2023!
SRUM, or System Resource Utilization Monitor, is a feature of modern Windows systems (Win8+), intended to track the application usage, network utilization and system energy state. SRUM, as with most operating system features, wasn’t designed for the forensicator, but that doesn’t mean we can’t use it to support our investigations.
Magnet DVR Examiner 3.2 is now available, and in this release, we’re introducing some key features to help you streamline your workflow and identify the evidence you need as quickly as possible.
With the continued trend towards remote work and dispersed workforces, companies are increasingly turning to cloud services for file storage, management and collaboration. Providing the storage for over 100,000 organizations and 67% of Fortune 500, Box.com has emerged as one of the leading cloud storage solutions for businesses.
We’re excited to share that IDC, the premier global market intelligence firm, has named Magnet Forensics a Major Player in eDiscovery.
Using biometrics is the process of measuring and analyzing biological data to identify an individual. Mobile devices with biometric-enabled features are used for many purposes, one of which is authentication.
We’re proud to once again be able to offer promising officers an opportunity to enter the field of, and advance in, digital forensics through the Magnet Forensics Scholarship Program. Applications are open until December 1, 2022.
Magnet AXIOM 6.6 is now available, and in this release, we’re introducing parsing for CLBX keychain, so you can uncover more from Cellebrite UFED and Premium iOS extractions. Plus, we are continuing to improve our analytical tools as you can now toggle between map points and clusters in World Map.
Magnet AXIOM Cyber 6.6 is here, and in this release, we have added new and updated features to help you collect, review, and interpret the evidence you need to keep your investigations moving forward.
Earlier this year, we introduced a new artifact category, volatile artifacts, which allows you to remotely collect live system information. Volatile artifacts are an especially important element of incident response investigations as they can provide unique insights into malware behavior and malicious activities that don’t leave easily detectable evidence trails.