2
AD Enterprise 7.1 Automate cyber workflows for rapid root-cause investigations www.accessdata.com Seamless cyber platform Integration AD Enterprise 7.1 integrates seamlessly with your cyber platform of choice (Demisto ® , Phantom, and more), to quickly collect the data you need to kick off a full post-breach investigation. Its easy-to-use interface takes complex information and presents it to the user without the need for scripting or learning a programming language. No other solution can accomplish end-to-end post-breach investigations like AD Enterprise. Dive into compound files at the endpoint, perform memory analysis and execute targeted collections on any file attribute. And now, customize your workflow to automatically collect cyber breach data for immediate, effective root-cause investigations from a single-agent solution. When your data’s been breached, rapid preservation is key to plugging any exploits and preventing another attack. AD Enterprise 7.1 automates previously time-intensive investigative workflows with a newly available API for collection, Python ® scripting updates and advanced machine learning, enabling faster incident response while minimizing risk and impact on business operations.

AD Enterprise 7 - AccessData · Dive into compound files at the endpoint, perform ... deep-dive analysis. Full API Support* With a new flexible and fully functional API, now you can

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: AD Enterprise 7 - AccessData · Dive into compound files at the endpoint, perform ... deep-dive analysis. Full API Support* With a new flexible and fully functional API, now you can

AD Enterprise 7.1 Automate cyber workflows for rapid root-cause investigations

www.accessdata.com

Seamless cyber platform Integration

AD Enterprise 7.1 integrates seamlessly with your

cyber platform of choice (Demisto®, Phantom, and

more), to quickly collect the data you need to kick

off a full post-breach investigation. Its easy-to-use

interface takes complex information and presents

it to the user without the need for scripting or learning

a programming language.

No other solution can accomplish end-to-end

post-breach investigations like AD Enterprise.

Dive into compound files at the endpoint, perform

memory analysis and execute targeted collections

on any file attribute. And now, customize your

workflow to automatically collect cyber breach data

for immediate, effective root-cause investigations

from a single-agent solution.

When your data’s been breached, rapid preservation is key to plugging any exploits and preventing another attack.

AD Enterprise 7.1 automates previously time-intensive investigative workflows with a newly available API for collection,

Python® scripting updates and advanced machine learning, enabling faster incident response while minimizing risk and impact

on business operations.

Page 2: AD Enterprise 7 - AccessData · Dive into compound files at the endpoint, perform ... deep-dive analysis. Full API Support* With a new flexible and fully functional API, now you can

*Additional API license required.©2019 AccessData Group, Inc. All Rights Reserved. AccessData is a registered trademark owned by AccessData in the United States and other jurisdictions and may not be used without prior written permission. All other marks and brands may be claimed as property of their respective owners. 042019

Whether it’s for investigation, litigation or compliance, AccessData® offers industry-leading solutions that put the power of forensics in your hands. For over 30 years, AccessData has worked with more than 130,000 clients in law enforcement, government agencies, corporations and law firms around the world to understand and focus on their unique collection-to-analysis needs. The result? Products that empower faster results, better insights, and more connectivity. For more information, visit www.accessdata.com

Visit us online: www.accessdata.com

International Sales+44 20 7856 [email protected]

Global Headquarters+1 801 377 5410588 West 300 SouthLindon, Utah

North American Sales+1 800 574 5199Fax: +1 801 765 [email protected]

Turn time crunched into time savedThe latest release of AD Enterprise 7.1 features a new API, support for Apple® file system, advanced Python scripting

enhancements and more, all designed to speed investigations and ensure accessibility to data directly from the endpoint.

With AD Enterprise 7.1, you can get these great features and more, including advanced facial and image recognition

capabilities, DPE Monitoring capabilities, a new JSON Importer and simplified chat conversation analysis capabilities.

To learn more or request a demo, visit marketing.accessdata.com/7.1

Integration and AutomationNew API Automates Cyber Workflows*

When a possible cyber incident is detected by your

cyber security platform of choice, a forensic collection will

automatically be initiated through the integrated API, using

preconfigured templates to quickly and easily capture the

data related to the breach for root-cause investigations.

The data is then available in AD Enterprise for further

deep-dive analysis.

Full API Support*

With a new flexible and fully functional API, now you can

automate workflows and integrate with other software—

from case management systems to e-discovery platforms—

with ease.

Added Encryption Support

AD Enterprise now features new endpoint encryption

support for Dell® Data Centric and Dell Full Disk Encryption.

Python Scripting Enhancements

Invoke Python directly from within the AD Enterprise

interface and run over files to keep all data in one location

without risking spoliation.

Enhanced Processing CapabilitiesSupport for Apple File Systems

BYOD has taken over—organizations frequently need

to process data from Apple devices. With AD Enterprise

7.1, quickly parse through data from any Apple operating

system, up to macOS® 10.14 (Mojave).

Additional Parsers for Mobile Data

Nine new parsers have been added to further support

mobile analysis, including Android™ SMS/MMS, Android

Mail, Android Calendar, Android Contacts, Android Call Log,

Android Kik, Google™ Hangouts for Android, Android Viber,

and Instagram® for Android.

On-Demand Scalability

Add or remove distributed processing engines on the fly,

with new automatic virtual distributed processing. Now you

can spin up your processing power when demand is high

and scale down when in a review stage.