INCIDENT RESPONSE SERVICES

Digital Forensics

Uncover what happened on your computer systems, network and mobile devices to aid in criminal, fraud, counterintelligence or corporate investigations.
BENEFITS

Complex digital investigations require specialized forensics experts


When cybersecurity disputes end up in court or lead to a regulatory or internal investigation, your legal counsel can count on Unit 42TM to analyze digital evidence and provide expert witness testimony.

USE CASES

Here’s where we excel


Unit 42’s digital forensic experts have written books, performed extensive investigations and advised legal teams on some of the highest-profile data breaches.

INSIDER THREATS
INSIDER THREATS

INSIDER THREATS

 INTELLECTUAL PROPERTY THEFT
 INTELLECTUAL PROPERTY THEFT

INTELLECTUAL PROPERTY THEFT

MOBILE FORENSICS
MOBILE FORENSICS

MOBILE FORENSICS

EXPERT WITNESS TESTIMONY
EXPERT WITNESS TESTIMONY

EXPERT WITNESS TESTIMONY

METHODOLOGY

Our approach to digital forensic investigations

IDENTIFY

Collect digital evidence

Identify all evidence and understand how and where it is stored. This requires deep technical expertise and analysis of all manner of digital media.

PRESERVE

Isolate and secure all evidence

The next step is to isolate, secure and preserve all data until the end of the investigation, including any regulatory or litigation-related inquiries.

ANALYZE

Uncover the facts

The data is then reviewed and analyzed to draw conclusions on the evidence found.

DOCUMENT

Reconstruct the incident or crime

Relevant findings from analyzed evidence are used to recreate and document the incident or crime for a thorough investigation.

REPORT

Present findings

All evidence and findings are presented according to forensics protocols, including the analyst’s methodology and procedures. Unit 42 experts will testify in court if needed.

WHY UNIT 42

World-renowned security experts, always in your corner


As an industry-leading threat intelligence, cyber risk management and incident response organization, it's our job to help you prepare and respond to some of the most challenging threats so that your team can get back to business faster. As threats escalate, we act as your trusted partner to advise and strengthen your security strategies.

Related resources

DATASHEET

Unit 42 Retainer

Case Study

Retailer evaluates impact of credit card skimming attack with analysis from Unit 42

VIDEO

BlackCat Ransomware Case Study

jeffries-logo

Go from reactive to proactive

Our consultants serve as your trusted advisors to assess and test your security controls against the right threats, transform your security strategy with an intelligence-informed approach and respond to incidents in record time.
Please complete reCAPTCHA to enable form submission.
By submitting this form, you agree to our Terms. View our Privacy Statement.