Collections And Digital Forensics
Collections
You need to know that your data is getting collected accurately and completely. Our forensics experts can collect active and deleted, corrupted, and non-traditional data types from anywhere in the world. And by using rapID file transfer, ID’s top-of-the-line file transfer technology, we get data to its desired destination quicker than ever before!
ID’s forensic collection agents are frequently retained as consultants by Fortune 100 companies to design data collection and processing projects that meet both the court’s needs as well as your budget and business goals. And beyond our vast experience with commoditized forensics like laptops and cell phone collections and collecting from cloud-based repositories and applications, we have a keen knowledge of legacy systems that most forensics teams don’t have.
Remote Collection
ID offers a programmatic and forensically sound solution to executing remote collections of mobile devices, desktops, laptops, network shares, and email servers. Regardless of whether data is traditional in nature, or a variety of new, emerging collaboration and messaging platforms, ID delivers results that inspire confidence.
We use the S.A.F.E. method to ensure remote collection is handled with ease and efficiency
Send
ID creates and ships the custom forensic remote collection kit, configured to the specific needs of the client.
Attach
Our seasoned forensics experts work with the client to connect devices and begin supervised remote forensic collection process.
Forward
Client ships and transfer devices and chain of custody to ID’s data intake team to create working copies and catalog data.
Examine
The ID forensics team perform examination and analysis of collected data and present results to the client.
Customized, defensible options to fit your unique needs
We connect, we drive – onsite collection
We connect, we drive – onsite collection.
You connect, we drive – collaborative collection
Our experts will send you a drive with our tools, you will connect it to your system, and via an online meeting, we will log in to your system and collect your data from afar, providing you with cost-saving flexibility AND a collection you can have confidence in.
You connect and drive, we consult
Our experts will send you a drive with our tools, you will connect it to your system, and via an online meeting, we will log in to your system and collect your data from afar, providing you with cost-saving flexibility AND a collection you can have confidence in.
-
Consultative Remote Collection
Our experts “shoulder surf” while your IT team handles a collection, providing guidance, advice, and monitoring, helping to complete the collection correctly, and allowing for testimony should you need it.
-
Self-Collection
You can collect your data and send it to us for preservation, hosting, and/or analytics.
Certifications
To protect organizations and their IP, Innovative Driven has developed AnalyzID – the employee separation kit
AnalyzID provides quick and in-depth forensic analysis of employee computers and automatically flags suspicious activity. This cost-effective solution will assess potential IP theft and mitigate risk.
The Impact that the Changing Nature of Documents is Having on eDiscovery
Notions about what constitutes a “document” have significantly changed over the years, leading to increasing complexity for government agencies and regulators in both the discovery process and during investigations.
Related Content

Blogs
Blogs

Events
Events

Case Studies
Case Studies

Managed Review Case Studies
Managed Review Case Studies
Managed Review Case Studies
Managed Review Case Studies

Forensic Analysis and Collections
Innovative Driven understands the complex nature of data…
Forensic Analysis and Collections
Innovative Driven understands the complex nature of data collection and the importance of a speedy, defensible approach.

AnalyzID
AnalyzID

Forensic Collection of Social Media
Forensic Collection of Social Media

Remote Mobile Forensic Toolkit
Remote Mobile Forensic Toolkit

Data Transfer Instructions
Data Transfer Instructions

Collection checklist
Collection checklist

Identifying PII While Maintaining Security
Identifying PII While Maintaining Security

Alternate Forms of Electronically Stored Information
Alternate Forms of Electronically Stored Information
