Need Help Fast? GET STARTED NOW

E-Discovery

Have you been contacted by legal representatives about data that may exist on your network in reference to some legal action? Do you have qualified personnel to properly locate, acquire and document the information that has been recovered? Will this potential information be needed in a court of law?

Digital Shield’s eDiscovery solutions provide a comprehensive, integrated information governance solution to enable the identification, preservation, collection, processing, and review of information in response to litigation, compliance, and internal or regulatory investigations.

Digital Shield’s tailored eDiscovery solutions enable you to respond effectively to e-discovery requests, reduce the volume of data subject to the discovery process, and manage data according to business value and risk.

DSI experts have been conducting forensic examinations for 15 years, and have responded to and acquired potential evidence from both government agencies as well as commercial entities. DSI experts understand the sensitivity of the acquisitions, as well as the scope of what information can and should be collected from the corporation.

Incident Response & Forensics

Cyber Crimes, worms and viruses occur on an hourly basis not only from the Internet but also from employees inside the trusted network. When these issues occur, how do you handle them in a timely manner and who would you contact to respond? Do you have qualified personnel to respond and capture the necessary information pertinent to the crime or attack? Will this incident be prosecuted in a court of law for punitive damages? If so, certified, qualified, and experienced personnel need to be engaged to ensure the data is collected in a manner that can be presented in a court of law and prove that the evidence has not been altered in any way.

Digital Shield Security Professionals have an extensive background in conducting forensic examinations for both Government Agencies as well as Private Corporations. DSI professionals are former Law Enforcement and US Military, and have testified in both local and federal court for a wide variety of cases from Child Pornography to Unauthorized Intrusions. DSI Professionals maintain top security qualifications and are on the cutting edge of the latest technologies such as Digital Forensics, CellularForensics, Vulnerability Assessments, Penetration Testing, and Wireless Communications (802.11x/Bluetooth).

Contact DSI Security Professionals today to assist you in defending and securing your critical infrastructure!

Mobile Device Data Extraction

Have you ever needed the ability to backup the entire contents of your mobile device? Most backup software does not give you the capability to get all of the information from a cell phone to include application data (apps) or deleted information.

Do you need the ability to find out what employees are doing on company mobile devices? Are they exposing secretive corporate data? Are they sending information to competitors giving out your latest contract or business plans? Are employees using their corporate mobile devices for illicit purposes, breaking the law?

Have you ever needed to know what a loved one is doing on a mobile device to ensure they are safe, protected and not releasing sensitive information about you, your family or your loved ones?

Digital Shield, Inc. offers the ability to extract logical and physical information from mobile devices such as cell phones, GPS devices, and Tablets. This information can be archived for safe storage, or can be analyzed to find out what individuals are utilizing the devices for and how information is being exchanged from the device. Digital Shield, Inc. has the capabilities to extract:

Logical Information:

  • Contacts
  • SMS Data
  • SMS Messages
  • Location Data
  • Call Log Data
  • Calendar Information
  • Picture Files
  • Video Files
  • Email Messages
  • Web History
  • Application Data

Physical Information:

  • Contacts (+deleted)
  • SMS Messages (+deleted)
  • MMS Messages (+deleted)
  • Call Log Data (+deleted)
  • Calendar Information
  • Picture Files (+deleted)
  • Video Files (+deleted)
  • Email Messages (+deleted)
  • Web History
  • Application Data (+deleted)
  • User Accounts
  • Passwords
  • Searched Items
  • Installed Applications and Application Data
  • File System
  • Unallocated Space or Deleted Space

Digital Shield, Inc. uses the latest technologies, hardware and software to extract information from mobile devices. We also use the latest Industry Standards when conducting investigations on mobile devices to ensure the information is admissible in court proceedings if necessary. Digital Shield examiners are former law enforcement and have testified in court both federally and at the local levels (State) for their forensics findings.

Litigation Support

Does your organization need the ability to have qualified experts confirm the evidentiary findings in a criminal or civil matter? Does your organization need qualified computer and mobile device experts to testify in a court of law or rebut another witness’s testimonies?

Digital Shield, Inc. experts have over twenty (20) years of computer and mobile device investigative experience. Our experts have testified in local and federal court systems on computer related evidence. Our experts our certified forensic examiners, and continue to work live cases involving electronic evidence. Digital Shield, Inc. can provide expert consultation and support services to attorneys for pending or current cases involving electronic evidence (computer, Network or Mobile Device). These services will be tailored to the individual case and may include:

  • Initial consultation to assess the case and any relevant issues
  • Evaluation of evidence, forensic examinations and reports that may be related to the case
  • Assistance with preparing for interrogatories, depositions and trial

E-Discovery presents unique challenges, especially when evidence can be derived from mobile devices or multiple related locations. All parties must be cognizant of issues related to data retention, evidence spoliation and privilege. Digital Shield, Inc. can assist to ensure that this process is performed accurately and thoroughly.

Data Recovery

Digital Shield, Inc. uses the latest technologies, hardware and software to extract information from mobile devices. Digital Shield, Inc. also uses the Industry Standards when conducting investigations on mobile devices to ensure the information is admissible in court proceedings if necessary. Digital Shield examiners are former law enforcement and have testified in court both federally and at the local levels (State) for their forensics findings.

Vulnerability Assessments

Your network architecture contains both information about your company as well as information about clients you conduct business with on a day to day basis. Does your organization have security policies and procedures in place to properly protect your critical information? How often is the network checked for the latest vulnerabilities for both operating systems and the applications they are running? How secure physically are your networks from insiders or outsiders posing as employees to infiltrate your architecture? Have your employees been properly trained against Social Engineering?

This process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker, and can involve active exploitation of security vulnerabilities. Any security issues that are found will be presented to the system owner together with an assessment of the impact and with a proposal for mitigation or a technical solution.

System administrators responsible for day to day security may have little time to deal with security since they are occupied with other tasks such as locked out users, printer issues, network trouble shooting, installing machines and configuring new devices. Even if time is available system administrators should not be responsible for monitoring themselves and checking security policies that should have been or haven’t properly been installed. Therefore a dedicated team should work with administrators to test, scan, penetrate, and implement new security measures as needed on a quarterly basis.

DSI Security professionals use the most up-to-date security scanning and penetration testing tools to locate and mitigate possible entry points from both the internal network, as well as perimeter devices. DSI Security professionals have an extensive background in performing assessments both network and physical based for clients within the United States and abroad.

Contact DSI Security Professionals today to assist you in defending and securing your critical infrastructure!

Certification & Accreditation

DSI is dedicated in assisting federal agencies with all phases of their certification and accreditation (C&A) planning to comply with all government regulations and guidance, including Appendix III of OMB A-130, National Institute of Standards and Technology Certification and Accreditation Process guidelines (NIST 800 series) and the Defense Information Assurance Certification and Accreditation Process (DIACAP).

We help security managers with initial C&A program planning, system and application owners with C&A life cycle implementation, and auditors with compliance assessment. Specifically, Our C&A support services include the following:

  • C&A Program Development Support. We assist agency security managers establish a C&A program. Our expert information security consultants help select the appropriate federal C&A standards and requirements.
  • Certification and Accreditation Quick Look (CAQL). Our Team provides organizations with a 6-week snapshot of their systems. We outline the preparations for, or progress toward, formal certification & accreditation.
  • Life Cycle Certification Support. We provide system and application owners with tailored, full-service support during all phases of certification: Phase 1 (Definition), Phase 2 (Verification), Phase 3 (Validation), and Phase 4 (Post-Accreditation).
  • Certification Audit Support. Our Team helps inspectors general or designated approving authorities perform certification assessments of agency systems in accordance with DIACAP, NIACAP, or OMB A-130.

DSI employees holding DoD/DOJ Top Secret security clearances are trained to assess both unclassified/classified and open/closed networks. Contact us today to get a jump-start on your C&A program!