ASHBURN, Va. -- Paraben Corporation Emphasizes the Importance of Forensic Readiness.
During a time when securing digital information is a vital practice for all organizations, Paraben Corporation is emphasizing the importance of maximizing forensic readiness within businesses.
Forensic readiness is an organization's ability to maximize its potential to use digital evidence to enhance existing security, while minimizing the costs of an investigation. Traditional information security programs often focus on prevention and detection measures, however, there is a business requirement for digital evidence to be available even before an incident occurs, which links very closely with business continuity planning and incident response procedures.
Regularly collecting digital evidence could help manage the impact of some important business risks. Digital evidence can:
- Support a legal defens
- Show the due care/due diligence was taken in a particular process
- Verify the terms of a commercial transaction
- Act as a deterrent. A good deal of crime occurs internally. Staff will know what an organization's attitude is toward the policing of corporate systems
- Lend support to internal disciplinary actions
- Aid with compliance for corporate governance or regulatory enforcement
"Forensic readiness allows for an organization to assume that an incident will occur, and prevail, even if a risk assessment says it should not," said Amber Schroader, CEO. "In this day and age, it is so important for businesses to protect themselves on a digital level, and forensic preparedness is the ideal way to accomplish this."
Used individually or in concert, Paraben's forensic investigation tools establish an enhanced capability that allows computer security professionals to rethink how to recognize risks and protect against cyber threats.
Paraben's suite of tools provides forensic readiness and enables sense-making of cyber security information in the following unique ways:
- Computer network intrusion detection system (NIDS) log file data can be loaded, and suspicious connections between machines examined. This data can then be combined with other log data to develop a more complete understanding of security breach events.
- E-mails can be forensically examined to model communication patterns and to summarize e-mail content. Directory structures can be displayed and filtered on file modification times to see what activity occurred on what dates. Multiple file systems can be quickly compared to discover identical files that may have been transferred from one machine to another.
- Mobile devices can be forensically acquired, examined and cross-referenced with other evidence sources within the organization to provide even greater visibility.