Product Image Product Image

Rapid Triage, Ultra-Simple Approach

Quickly triage Mac and Windows computers, mobile devices, and external drives for illicit content such as CSAM, usernames, and contacts in the field or the lab with automated insights, enabling examiners and non-technical stakeholders to use Magnet OUTRIDER with confidence.

90%

Over 90% of criminal investigations include some form of digital evidence.¹

The average U.S. household owns 25 connected devices, including smartphones, laptops, tablets, smartwatches, etc.²

¹ National Police Council. ² Deloitte, 2021 Connectivity and Mobile Trends Survey, March 2021.

Triage Mobile Devices

Save valuable time in the field or in the lab by using Magnet OUTRIDER to quickly scan mobile devices and automatically uncover SMS/MMS messages, illicit apps, device ID, recently used apps, contact list, call logs, and more, in minutes.

KEY TAKEAWAYS

  1. Lightning-fast mobile scans in under a minute.
  2. Scan multiple mobile devices at the same time.
  3. Use keywords to filter and scan for specific evidence relevant to your case.
  4. Detect the presence of secure folders and multiple user accounts.
Magnet OUTRIDER product screen

Identify Actionable Evidence Fast

Get your team real-time intel for interviews, warrants, and seizures by uncovering actionable evidence from mobile devices, computers, and hard drives in under six minutes without having to perform a full extraction. Scan internet browser history, text messages, recent activity, and account information for keywords, specific URLs and file names from an imported NCMEC CyberTip report, or load targeted URLs and keywords into OUTRIDER that are relevant to your case.

KEY TAKEAWAYS

  1. No more manual scans: OUTRIDER automatically counts and displays the number of hits during a scan.
  2. Scan multiple devices for evidence in less than six minutes.
  3. Use MD5 hash matching to locate files from known hashsets like VICS or CAID.
  4. Load custom keywords or NCMEC reports to find evidence fast.

Get Started Quickly

OUTRIDER was designed for speed and simplicity. As a preprogrammed, turnkey solution, OUTRIDER enables even non-technical stakeholders to confidently use OUTRIDER with its preconfigured artifact categories that automatically count and display the number of hits during scans. In less than three steps, you can start running scans in the field or in the lab.

KEY TAKEAWAYS

  1. Get OUTRIDER up and running in less than three clicks.
  2. Detect known CSAM in a fraction of the time (minutes) with pre-programmed Child Rescue Coalition CSAM detection technology (Neula).
  3. Easy-to-use interface to enable non-technical users to confidentially run scans.
Magnet OUTRIDER product screen

Capture Live System Artifacts and Memory

Quickly gather another layer of information by analyzing live system artifacts and processes actively running on the device. Gather additional browsing history, access files that have been unencrypted, and encryption keys.

KEY TAKEAWAYS

  1. Perform live system scans with option to collect:
    • Valuable operating system artifacts.
    • Capture RAM.
    • Take a screenshot of the desktop.
    • Obtain the external IP address for the system.
  2. Leverage insights to support probable cause for additional search warrant requests.

RELATED RESOURCES

REQUEST YOUR FREE TRIAL TODAY

Try Magnet OUTRIDER Today

Start your free trial today and put OUTRIDER to the test in the field and in the lab.