Description
Rocket leverages the cloud and combines on-demand preservations and automation to preserve iPhones and computers locally or across the internet. As the target computer is being imaged the evidence files are saved back to the investigator’s storage or AWS S3 cloud account in real time. This eliminates the manual workflow, and the requirement for shipping data collection kits, onsite engagements, remote desktop connections or blank hard drives. Rocket is simple to use just create a Rocket account and leverage the cloud to deploy, preserve and deliver the evidence files in minutes.
Features:
· Your own branded Rocket On-Demand site in AWS cloud
· Unlimited access for your project managers, team members and clients
· On-demand data collection and evidence delivery
· Data collection management
· Case management
· Client invoice and billables management
· Team and client cloud collaboration
Add Data Collections To Your Rocket On-Demand Account:
Fill up your free Rocket account with Rocket Data Collections. Whether you choose our managed or self-service plan, both data collections are the same in every way.
· Full Disk bit level data preservation in E01 format
· Targeted Target documents by filtering
· Drop & Send Drag and drop files and folders into a preservation window
· Allows custodians to pause/resume the data collection for up to 7 hours without requiring a restart of the collection
· If the internet connection breaks Rocket will retry to connect for up to 24 hours without requiring a restart of the collection
Evidence Destinations:
· Local save to a USB hard drive
· Local save to a network share
· Save across the internet to your own storage
· Save across the internet to your AWS S3 account
Preservation:
· Windows computers
· iPhones & tablets
· Mac OSX (coming soon)
The Data Collection Deliverable:
· Profiles the target computers physically connected hard drives including physical disk number, make, model, capacity, serial number
· BIOS name and version, local time, time zone, OS version
· Computer type, make, model and serial
· Chain of custody
· Forensic image verification report
· File and folder forensic verification (confirm what files were preserved and if any files were skipped over during the collection)
Locates Target Devices Across The Internet:
· Behind VPN’s (will not time out)
· Corporate firewalled networks
· Wi-Fi residential, hotel, café, public networks
· Government (non-classified)
· Government (offline data collections with local storage)
Reviews
There are no reviews yet.