AXIOM Cyber Hero Image

Simplify Your Investigations

AXIOM Cyber is a robust digital forensics and incident response solution for businesses that need to perform remote acquisitions and collect & analyze evidence from computers, the cloud, and mobile devices.

With the Growing Complexity of Cybersecurity Threats, the Stakes Have Never Been Higher

It’s not a matter of if a security event occurs, it’s a matter of when. Incident Response, insider threats, and HR investigations are all on the rise with no signs of stopping. The pressure is on you to have the answers needed to safeguard your business.

Nothing should slow you down as you seek the truth.

Magnet Forensics has built a global reputation of excellence, reliability, and trustworthiness. We offer modern solutions for digital investigations.

Incident Response Root Cause Analysis

Insider Threats and HR Investigations

eDiscovery Collection, Review, and Analysis

Off-Network Collection

AXIOM Cyber enables you to quickly and covertly perform remote collections of Mac and Windows endpoints even when they aren’t connected to your corporate network. Remotely collected data is written to an AFF4-L forensically sound container.

BLOG: Off-Network Collection

Advanced Cloud Support

Collect data from corporate cloud storage services like AWS and Azure in addition to communication apps like Slack and Teams. Use Admin credentials to easily acquire from Office 365, G Suite, and Box to speed up investigations.

AXIOM Cyber: Cloud Capabilities

Case Intelligence

Powerful Analytics features like Timeline, Connections and Magnet.AI create actionable intelligence. AXIOM Cyber’s artifacts-first approach immediately presents the data needed to work through your case with ease and efficiency.

Blog: Analytics

Support eDiscovery

Corporate forensic examiners have a seemingly endless list of tasks and responsibilities. Often one of those extra-curricular tasks is to perform collections that support eDiscovery. Use AXIOM Cyber to generate a load file that can be ingested by eDiscovery review platforms.

Blog: Load Files

It’s Quick and Easy to Get Started with AXIOM Cyber

Step 1: REQUEST A FREE TRIAL

When you request a free trial, we’ll follow up with you to schedule a call to understand your business needs.

Step 2: TRY AXIOM CYBER FOR FREE

After a brief tailored demo, you’ll get started with your free trial so you can try it yourself!

Step 3: GET AXIOM CYBER

Once you’ve chosen AXIOM Cyber, getting started is easy with expert support from our team.

Hear How Our Customers Simplify Their Investigations with AXIOM Cyber

Case Study

Incident Response

“Using AXIOM Cyber’s Timeline feature, we were able to identify what happened within the malware infection. Honestly, I don’t think we would have found the details we were looking for if we were using another tool. We probably would have missed some of those events that we caught within Timeline.”

DFIR Analyst, Cybersecurity Threat Analysis Center US-Based Energy and Defense Corporation

DOWNLOAD NOW

Case Study

Targeted Locations

“Using targeted locations in AXIOM Cyber gave me the perfect starting point for my remote collection and ultimately ended up saving me hours of invaluable time.”

Computer Forensic Investigator, Global 500 Banking Company

DOWNLOAD NOW

RELATED RESOURCES

Blog
Published on January 27, 2020

Investigating Intellectual Property Theft with Magnet AXIOM Cyber

Intellectual Property is likely the most valuable asset that your company owns. And it can often the target of cyber attacks from external sources like hackers, as well as from insider threats too. Insiders like employees, contractors, or other third parties with access to privileged information present a very real threat to your IP because it’s so easily available. https://www.youtube.com/watch?v=IrhWASaMZD0 “It Can Be Very Difficult to Distinguish Illicit Access from Legitimate Access” The CERT Guide to Insider Threats states that: “Insiders steal information for which they already have authorized access, and usually steal it at work during normal business hours. In fact, they steal the same information that they access in the course of their normal job. Therefore, it can be very difficult to distinguish illicit access from legitimate access.” And it’s everywhere from emails, to Office 365 docs, cloud storage, employee workstations, and mobile devices. Keeping the proper checks and balances in place is difficult if not impossible since IP Theft is most often committed by those who have access to it (or even have helped create it). When investigating cases of IP Theft, it’s imperative to understand at a granular level how files are moving between different locations, how they are being altered, what programs or apps are being used to access them and by whom. It’s equally important to analyze all of this evidence in one case file. How Magnet AXIOM Cyber Can Help Investigate IP Theft Magnet AXIOM Cyber helps investigators unite images from multiple evidentiary sources into a single case file and analyze the complete body of evidence as a whole. This is crucial for understanding how IP is exfiltrated from your business. Watch this video to see our Forensic Consultant, Tarah Melton, demonstrate how AXIOM Cyber can be used to investigate IP Theft. https://www.youtube.com/watch?v=exPJRcvKItE “Being able to quickly see and find evidence of IP Theft helped us immensely. Specially finding out how the document went from the cloud to a removable drive prior to the employee leaving the company to go work for a competitor.” —Manager, Digital Forensics Large Media and Entertainment Enterprise Here are some other ways that our customers are using Magnet AXIOM Cyber to help find evidence in IP Theft investigations: Connections – Use Connections to follow the path of files and documents to understand where they went, who they were sent to and who sent themTimeline – Typically insiders will steal IP one month before they resign and one month after they resign, use AXIOM Cyber to build a timeline of events based on relative time filters so you can examine relevant eventsCloud Storage – Acquire evidence from cloud storage services like AWS, SharePoint, G Drive, and more and include it in your examination. Audit logs and other artifacts allow you to track how files moved between physical devices and the cloudArtifacts-First Approach – AXIOM Cyber’s artifacts-first approach is perfect for helping you quickly identify artifacts like Email and Removable Media: the two most common data exfiltration methodsCovert Remote Acquisition – Covertly acquire evidence from target endpoints with a configurable remote acquisition agent so employees suspected of IP theft aren't tipped off to an investigationMagnet.AI – Another common way to exfil data is by using screenshots. Using artificial intelligence, Magnet.AI will immediately surface screenshots no matter where they’re saved in the evidence Use Magnet AXIOM Cyber for your next IP Theft investigation by requesting a free trial today!

About a 3 minute view

January 27, 2020 • About a 3 minute view

Blog
Published on January 27, 2020

Employee Misconduct Investigations — Get the Whole Story with Magnet AXIOM Cyber

Employee Misconduct cases, usually initiated by HR or from managers, can be wide ranging. From harassment, to misuse of corporate assets, to visiting prohibited websites while at work, Employee Misconduct has a very real toll on organizations. With harassment alone, 70% of people who are bullied or harassed in the workplace end up leaving their employer. This employee turnover can result in significant costs such as retraining, lost productivity, and even potential Wrongful Termination lawsuits—not to mention intangible costs such as the impacts on company culture, workplace morale, and brand reputation. https://www.youtube.com/watch?v=SAfnFDQqzGE How AXIOM Cyber Can Help In these cases, swift action is needed to investigate allegations and reports from internal stakeholders so that the appropriate action can be taken. Magnet AXIOM Cyber gives investigators the tools to quickly find the evidence that they’re looking for wherever it may be. Whether it’s a Slack conversation, communication via social media or mobile devices, or files that are buried and obfuscated on someone’s hard drive, AXIOM Cyber can help find the evidence needed to drive a decision made by HR or another stakeholder. Watch this video from our Forensic Consultant, Trey Amick, to see how you can use AXIOM Cyber for Employee Misconduct investigations. https://www.youtube.com/watch?v=8hoLpT5pMjM “I used Magnet to find artifacts and evidence from Chrome history along with Timeline to prove that a user misused company asset for sexual harassment and then to access and store inappropriate contents. It easily showed me where the content came from, what was used to open it and where it was stored along with the creation and access times. Very helpful information to win the case.” Digital Forensic Investigator Fortune 500 Insurance Group Below are a few other helpful ways that our customers are using Magnet AXIOM Cyber to help them with their Employee Misconduct cases: Magnet.AI – For sexual harassment cases, use AI to quickly and automatically scan your case file for sexual conversations or images of nudity and surface them for review and analysisCloud Sources – Acquire from cloud services like Slack and Office 365 with user or admin credentials. Analyze cloud evidence alongside data from social media to corroborate claims of harassmentCovert Remote Acquisition – Covertly acquire evidence from target endpoints with a configurable remote acquisition agent so individuals accused of harassment aren’t tipped off to an investigationTimeline – Speed up your investigation by narrowing in timestamps from the file system or artifacts and keywords that were reported in misconduct investigationsInternet Artifacts – A range of artifacts will help you determine if employees were visiting prohibited websites and prove that it was actually them or notConversation View – Rebuild chat conversations in a familiar easy-to-read view that simplifies analysis and reporting for non-technical stakeholders Use AXIOM Cyber for your next employee misconduct investigation by requesting a free trial today!

About a 2 minute view

January 27, 2020 • About a 2 minute view

Blog
Published on January 27, 2020

Investigating Intellectual Property Theft with Magnet AXIOM Cyber

Intellectual Property is likely the most valuable asset that your company owns. And it can often the target of cyber attacks from external sources like hackers, as well as from insider threats too. Insiders like employees, contractors, or other third parties with access to privileged information present a very real threat to your IP because it’s so easily available. https://www.youtube.com/watch?v=IrhWASaMZD0 “It Can Be Very Difficult to Distinguish Illicit Access from Legitimate Access” The CERT Guide to Insider Threats states that: “Insiders steal information for which they already have authorized access, and usually steal it at work during normal business hours. In fact, they steal the same information that they access in the course of their normal job. Therefore, it can be very difficult to distinguish illicit access from legitimate access.” And it’s everywhere from emails, to Office 365 docs, cloud storage, employee workstations, and mobile devices. Keeping the proper checks and balances in place is difficult if not impossible since IP Theft is most often committed by those who have access to it (or even have helped create it). When investigating cases of IP Theft, it’s imperative to understand at a granular level how files are moving between different locations, how they are being altered, what programs or apps are being used to access them and by whom. It’s equally important to analyze all of this evidence in one case file. How Magnet AXIOM Cyber Can Help Investigate IP Theft Magnet AXIOM Cyber helps investigators unite images from multiple evidentiary sources into a single case file and analyze the complete body of evidence as a whole. This is crucial for understanding how IP is exfiltrated from your business. Watch this video to see our Forensic Consultant, Tarah Melton, demonstrate how AXIOM Cyber can be used to investigate IP Theft. https://www.youtube.com/watch?v=exPJRcvKItE “Being able to quickly see and find evidence of IP Theft helped us immensely. Specially finding out how the document went from the cloud to a removable drive prior to the employee leaving the company to go work for a competitor.” —Manager, Digital Forensics Large Media and Entertainment Enterprise Here are some other ways that our customers are using Magnet AXIOM Cyber to help find evidence in IP Theft investigations: Connections – Use Connections to follow the path of files and documents to understand where they went, who they were sent to and who sent themTimeline – Typically insiders will steal IP one month before they resign and one month after they resign, use AXIOM Cyber to build a timeline of events based on relative time filters so you can examine relevant eventsCloud Storage – Acquire evidence from cloud storage services like AWS, SharePoint, G Drive, and more and include it in your examination. Audit logs and other artifacts allow you to track how files moved between physical devices and the cloudArtifacts-First Approach – AXIOM Cyber’s artifacts-first approach is perfect for helping you quickly identify artifacts like Email and Removable Media: the two most common data exfiltration methodsCovert Remote Acquisition – Covertly acquire evidence from target endpoints with a configurable remote acquisition agent so employees suspected of IP theft aren't tipped off to an investigationMagnet.AI – Another common way to exfil data is by using screenshots. Using artificial intelligence, Magnet.AI will immediately surface screenshots no matter where they’re saved in the evidence Use Magnet AXIOM Cyber for your next IP Theft investigation by requesting a free trial today!

About a 3 minute view

January 27, 2020 • About a 3 minute view

Blog
Published on January 27, 2020

Employee Misconduct Investigations — Get the Whole Story with Magnet AXIOM Cyber

Employee Misconduct cases, usually initiated by HR or from managers, can be wide ranging. From harassment, to misuse of corporate assets, to visiting prohibited websites while at work, Employee Misconduct has a very real toll on organizations. With harassment alone, 70% of people who are bullied or harassed in the workplace end up leaving their employer. This employee turnover can result in significant costs such as retraining, lost productivity, and even potential Wrongful Termination lawsuits—not to mention intangible costs such as the impacts on company culture, workplace morale, and brand reputation. https://www.youtube.com/watch?v=SAfnFDQqzGE How AXIOM Cyber Can Help In these cases, swift action is needed to investigate allegations and reports from internal stakeholders so that the appropriate action can be taken. Magnet AXIOM Cyber gives investigators the tools to quickly find the evidence that they’re looking for wherever it may be. Whether it’s a Slack conversation, communication via social media or mobile devices, or files that are buried and obfuscated on someone’s hard drive, AXIOM Cyber can help find the evidence needed to drive a decision made by HR or another stakeholder. Watch this video from our Forensic Consultant, Trey Amick, to see how you can use AXIOM Cyber for Employee Misconduct investigations. https://www.youtube.com/watch?v=8hoLpT5pMjM “I used Magnet to find artifacts and evidence from Chrome history along with Timeline to prove that a user misused company asset for sexual harassment and then to access and store inappropriate contents. It easily showed me where the content came from, what was used to open it and where it was stored along with the creation and access times. Very helpful information to win the case.” Digital Forensic Investigator Fortune 500 Insurance Group Below are a few other helpful ways that our customers are using Magnet AXIOM Cyber to help them with their Employee Misconduct cases: Magnet.AI – For sexual harassment cases, use AI to quickly and automatically scan your case file for sexual conversations or images of nudity and surface them for review and analysisCloud Sources – Acquire from cloud services like Slack and Office 365 with user or admin credentials. Analyze cloud evidence alongside data from social media to corroborate claims of harassmentCovert Remote Acquisition – Covertly acquire evidence from target endpoints with a configurable remote acquisition agent so individuals accused of harassment aren’t tipped off to an investigationTimeline – Speed up your investigation by narrowing in timestamps from the file system or artifacts and keywords that were reported in misconduct investigationsInternet Artifacts – A range of artifacts will help you determine if employees were visiting prohibited websites and prove that it was actually them or notConversation View – Rebuild chat conversations in a familiar easy-to-read view that simplifies analysis and reporting for non-technical stakeholders Use AXIOM Cyber for your next employee misconduct investigation by requesting a free trial today!

About a 2 minute view

January 27, 2020 • About a 2 minute view

REQUEST YOUR FREE TRIAL TODAY

Magnet AXIOM Cyber is a digital forensics solution that will help you find the truth.

Get right to the evidence you need with a solution that keeps you a step ahead.