Magnet Axiom Cyber 7.10: AWS Sign-in improvements & animated maps
The latest release of Magnet AXIOM Cyber is here, and we’re excited to share new features for analysis and cloud acquisitions.
The latest release of Magnet AXIOM Cyber is here, and we’re excited to share new features for analysis and cloud acquisitions.
As with many things, seeing is believing. To help add important context to your reports and testimony in court, we have introduced Animated Maps in Magnet AXIOM and AXIOM Cyber.
With the continued prominence of email in corporate settings, we’re thrilled to unveil a highly anticipated feature to AXIOM Cyber: Email Explorer.
A common scenario for SOC’s and IR teams is being handed a piece of evidence and being asked to “Find Evil.” Those on the receiving end know this to be a broad ask. If there is a known good image to compare things to, the process may be easier, but not all organizations have a gold build available for comparison.
Drawing upon a comprehensive survey of almost 400 corporate DFIR professionals, the fourth annual State of Enterprise Digital Forensics and Incident Response report examines the evolving contributions and experiences of DFIR professionals within corporate environments.
Magnet Automate Essentials provides you with everything you need to build automated workflows across your entire DFIR toolkit to help you complete your digital investigations faster, easier, and more reliably.
AUTOMATE Essentials is a new introductory version of Magnet AUTOMATE, offering you an even easier and more affordable way to get started with DFIR automation.
Digital forensics labs around the world are recognizing the benefits of automation, helping them to accelerate their investigations, improve investigation quality, and reduce burden on their staff. With Magnet Automate’s Essentials tier, you’ve now got a way to automate your workflows faster, easier, and more cost effectively than ever.
Magnet RESPONSE lets investigators and non-technical users easily collect and preserve critical data relevant to incident response investigations from local endpoints. But what happens when you need to collect from dozens of endpoints? That’s where the CLI (Command Line Interface) functionality of Magnet RESPONSE and comes into play. Join Security Forensics Consultant, Doug Metz, to learn how to collect from dozens of endpoints with Magnet RESPONSE and PowerShell and collect just the artifacts you need. Plus, get tips for processing with AXIOM Cyber.
Most modern electronic devices keep logs running that store information about who, what, when, where, and why processes are performed. Modern smartphones are certainly no different. In fact, certain artifacts can only be recovered by an in-depth review of these logging files.