• Training
  • Support
  • English
Explore Products
  • Magnet AI
  • Why Magnet
  • Products
        • MOBILE ACQUISITION
          • EXCLUSIVE FOR PUBLIC SAFETY
          • Magnet GraykeyAccess and extract data from iOS and Android devices
          • Magnet Graykey FastrakExtract from multiple devices simultaneously with your Graykey
          • Magnet VerakeyAdvanced consent-based mobile data extraction
          • Magnet Verakey FastrakExtract from multiple devices simultaneously with your Verakey
        • COLLECT AND ANALYZE
          • Magnet AxiomRecover and analyze all your evidence in one case
          • Magnet Axiom CyberSimplify your corporate investigations
          • Magnet NexusSimplified remote endpoint collection at scale
        • SHARE AND COLLABORATE
          • Magnet ReviewEffortlessly share and collaborate on digital evidence
        • MEDIA INVESTIGATIONS
          • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
          • Magnet VerifyDiscover the truth behind media evidence
          • Magnet WitnessStreamline your DVR and video acquisition and analysis
        • LAB AUTOMATION
          • Magnet AutomateClose cases faster by automating your workflow
        • PLATFORM
          • Powering modern digital investigations

            Learn More
        • Explore use cases
  • Products
    • Mobile Acquisition
      • Magnet GraykeyAccess and extract data from iOS and Android devices
      • Magnet Graykey FastrakExtract from multiple devices simultaneously with your Graykey
      • Magnet VerakeyAdvanced consent-based mobile data extraction
      • Magnet Verakey FastrakExtract from multiple devices simultaneously with your Verakey
    • Collect and Analyze
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet NexusSimplified remote endpoint collection at scale
    • Share and Collaborate
      • Magnet ReviewEffortlessly share and collaborate on digital evidence
    • Media Investigations
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Magnet WitnessStreamline your DVR and video acquisition and analysis
    • Lab Automation
      • Magnet AutomateClose cases faster by automating your workflow
    • Platform
      • Magnet OnePowering modern digital investigations
    • Explore use cases
  • Resources
    • All resources
          • All Resources

            Check out the latest resources and thought leadership for all resources.

            Explore All Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Investigators' Corner
            • Trust & Security
    • Resources By Industry

    • Enterprise
          • Enterprise Resources

            Check out the latest resources and thought leadership for enterprises and corporate digital investigations.

            Explore All Enterprise Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Public safety
          • Public Safety Resources

            Check out the latest resources and thought leadership for public safety.

            Explore All Public Safety Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
            • Legal Unpacked
            • Investigators' Corner
            • Trust & Security
    • Service providers
          • Service Providers Resources

            Check out the latest resources and thought leadership for forensic service providers.

            Explore All Service Provider Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Federal agencies
          • Federal Agencies Resources

            Check out the latest resources and thought leadership for federal agencies and government.

            Explore All Federal Agencies Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Military & intelligence
          • Military & Intelligence Resources

            Check out the latest resources and thought leadership for military, defense, and intelligence.

            Explore All Military & Intelligence Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
  • Our community
    • Officer wellness
    • Magnet Voices Program
    • Scholarship program
    • Agency Impact Award
  • Partners
    • Why partner with Magnet Forensics?
    • Strategic partners
    • Channel partners
    • Training partners
  • Company
    • Our team
    • Careers
    • Press
  • Training
  • Support
    • English
  • English

Content Industry: Enterprise

Automating Root Cause Analysis With EDR Integration in Magnet AUTOMATE

August 24, 2022

By Phil Froklage

By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can open themselves up to similar attacks in the future.

Tips & Tricks // Remotely Collect From Off-Network Endpoints Using AWS and AXIOM Cyber

August 24, 2022

By Phil Froklage

With a remote workforce that’s larger than ever, the need to collect data from endpoints not connected to the corporate network has never been greater. It’s critical to have the ability to collect and analyze off-network computers when you have an incident that needs to be investigated. Plus, you need to know what you can … Continued

Responding to Cybersecurity Incidents in Healthcare and Public Health (HPH) Sector

August 24, 2022

By Phil Froklage

This webinar will cover the latest threats the Healthcare and Public Health (HPH) sector faces, from Ransomware to Business Email Compromises, HIPPA and FTC notification requirements, incident response planning using both the NIST and ISO frameworks, and digital forensic solutions that help the HPH sector automate cybersecurity incident response and conduct a root cause analysis.

The Dos and Don’ts of Mobile Forensics

August 23, 2022

By Phil Froklage

Here are a few mobile device forensics dos and don’ts that can help you and your agency ensure you are following best practices.

Introduction to Comae Memory Queries

August 23, 2022

By Phil Froklage

In this presentation we will cover the main current features of Comae, and how the platform can be used for memory analysis but also for threat hunting through our memory queries and playbooks.

Conducting Corporate Investigations with Magnet AXIOM Cyber

August 10, 2022

By Phil Froklage

Corporate investigators need quick actionable intelligence in cases ranging from data breaches to insider threats in environments spanning from associate endpoints to cloud sources.  AXIOM Cyber’s network acquisition capabilities allow examiners to connect and acquire data from employee endpoints discreetly while collecting hard drive contents and memory.  Join Chris Blight, Solutions Consultant at Magnet Forensics, … Continued

Best Practices For Examining Mobile Consent Devices

August 9, 2022

By Phil Froklage

In this blog, we will provide best practices for examining mobile consent devices, so you are well equipped to process it.

Collecting Data From Google Workspace

August 4, 2022

By Phil Froklage

In this presentation, we will demonstrate how you can collect data from Google Workspace, while also sharing best practices for collection and what data is included in this acquisition. From there, you’ll see how to bring these results into Magnet AXIOM for robust analysis.

Forensic Analysis of MUICache Files in Windows

August 4, 2022

By Phil Froklage

As examiners, we often find ourselves wanting to know if a program was executed on a system, when it was executed on a system, or if a program or file ever existed on a system.

Tips & Tricks // Instantly Search and Filter a Target Endpoint with AXIOM Cyber

August 4, 2022

By Phil Froklage

When performing a remote collection of a remote endpoint using AXIOM Cyber, sometimes you need to quickly triage the target by looking for a specific piece of evidence, perhaps a particular file for example. Join Lynita Hinsch, Magnet Forensics Solutions Consultant, as she shows off some tips and tricks about how you can use index … Continued

Posts navigation

Older posts
Newer posts
We use cookies on our website.

To learn more about cookies, which ones we use on our site, and how to change your cookie settings, please view our Privacy Policy*. By continuing to use this site without changing your settings, you consent to our use of cookies in accordance with the Privacy Policy.*

View Privacy Policy Accept
Magnet Forensics Logo
Products
  • Magnet One
  • Magnet Axiom
  • Magnet Axiom Cyber
  • Magnet Graykey
  • Magnet Graykey Fastrak
  • Magnet Nexus
  • Magnet Verakey
  • Magnet Verakey Fastrak
  • Magnet Witness
  • Magnet Automate
  • Magnet Review
  • Magnet Outrider
  • Magnet Griffeye®
  • Magnet Griffeye® Operations
  • Magnet Griffeye® Enterprise
  • Magnet Verify
Partners
  • Strategic partners
  • Channel partners
  • Training partners
Community
  • The Auxtera Project
  • Magnet Forensics Scholarship Program
  • Agency Impact Award
  • Merchandise store
  • Magnet Idea Lab
Company
  • Careers
  • Our team
  • Magnet Idea Lab
  • Press
Resources
  • Resource center
  • Events
  • Blog
  • Free tools
  • Artifact exchange
  • Officer wellness
  • Customer stories
  • Grants for law enforcement
Support
  • Investigators’ Corner
  • Customer portal
  • Contact us
  • Subscribe to our emails
Training
  • Training overview
  • Courses and certifications
1 (844) 638-7884 sales@magnetforensics.com
  • Accessibility
  • Legal
  • Cookie Policy
  • Export approach
  • Trust & Security
  • Privacy Policy
  • California Collection Notice
  • Terms of Use
  • Email Preferences

Copyright© 2026 Magnet Forensics

Start modernizing your digital investigations today.

Complete the company & contact information form below and sales will be in touch with you shortly.