BELKASOFT EVIDENCE CENTER
Belkasoft X acquires, examines, analyzes, and presents digital evidence from major sources—computers, mobile devices, RAM and cloud services—in a forensically sound manner. If you need to share the case details with your colleagues, use a free-of-charge portable Evidence Reader.
Belkasoft X works out of the box and can be easily integrated into customer workflows. The software interface is so user-friendly that you can start working with your cases right after the Belkasoft X deployment.
QUICK AND SMART
While performing search tasks for evidence, Belkasoft X uses approaches that enable it to find the most forensically significant artifacts quickly instead of wasting time on redundant operations.
Powerful analytical features such as a connection graph, a timeline and advanced picture and video analysis help you to uncover facts rapidly.
SAVE YOUR TIME AND EFFORTS
Belkasoft X automates search tasks, and thus the product can run unattended, you can multitask and complete an investigation at a quick pace.
TAILORED TO YOUR NEEDS
You can select a product edition that suits your workflow, whether you are an expert in a digital forensic laboratory of a federal law enforcement agency or in a digital forensic and incident response consulting company, an investigator in a local or state police department, or a private practitioner.
Thanks to the flexible price structure you will find the product edition which perfectly fits your needs and budget.
Belkasoft X is based on the successful Belkasoft Evidence Center and encompasses many years of experience, a large amount of user feedback, and expert suggestions from numerous investigators from both a law enforcement and corporate world.
RELIABLE END-TO-END SOLUTION TO ACCELERATE
DIGITAL FORENSICS AND
TYPES OF ANALYSIS PERFORMED BY EVIDENCE CENTER
- Existing files search and analysis. Low-level investigation using Hex Viewer
- Timeline analysis – ability to display and filter all user activities and system events in a single aggregated view
- Full-text search through all types of collected evidence. Automatic indexing of various important text templates such as emails, phone numbers, MAC and IP addresses etc
- Data carving and destroyed evidence recovery. Custom carving, including support for Scalpel and FTK sets
- Live RAM analysis including process extraction and data visualization. Malware detection
- Hibernation file (hiberfil.sys) and page file (pagefile.sys) analysis
- Native SQLite analysis with freelist and WAL support
- Discovers deleted SQLite records, e.g. Skype conversations or WhatsApp messages Picture analysis including EXIF and GPS analysis, face/test/skin tone/forgery detection, pornography detection using neural networks
- Video key frame extraction
- Analysis of links between persons using Connection Graph features such as communication visualization and communities detection
- Encryption detection and decryption of found encrypted files
- Special files and folders analysis (e.g. Volume Shadow Copy, $OrphanFiles, $MFT etc.)
- Hashset analysis
- Flexible analysis with BelkaScript, scripting module
- Deduplication by using PhotoDNA hashing as well as not carving existing files