CONTACT US
(800) 775-8584
Contact Us for a Free
Digital Forensics
Case Evaluation
HOW CAN WE HELP?
Digital Forensics
Digital forensics is the identification and recovery of electronic data. If you or your company become the victim of unauthorized access to your systems or data, it is imperative to preserve as much information as possible. Preservation of emails, documents and system information can help identify how the access occurred and what data was compromised.
Protus3 will work to preserve and recover all possible data and attempt to determine what led to the compromise. Whether the unauthorized access is an outside entity or inside source, Protus3 will work to get you the information you need to make the appropriate decisions for yourself and your company.
Mobile Forensics
Mobile forensics is the acquisition and analysis of mobile devices. As with digital forensics, data is collected and reviewed using state-of-the-art equipment and software.
Mobile devices are being used more than ever in both our personal lives as well as to conduct business. Mobile devices contain text messages, images, videos, location and other data that may be relevant to an internal review of civil or criminal matters. Expedient collection of data from a mobile device can provide valuable information in many ongoing investigations or reviews and may be required.
Using proper software and processes, Protus3 can preserve the data on these devices to ensure it is not lost.

Follow The Data
The popularity of mobile devices such as cell phones, tablets, watches, GPS devices, and more is continuing to grow. The growth in the use of mobile devices leads to a greater likelihood that these devices come into play in civil litigation and criminal investigations. When this happens, it is imperative that the data on these devices is not lost or deleted.
Mobile forensics is a branch of digital forensics involving the acquisition and analysis of mobile devices in an effort to find, preserve or recover digital evidence. Ever-changing technological advances, new model releases, and everyday use of data encryption makes the forensic collection of the data on mobile devices more challenging.
Mobile forensics collects and analyzes data including internet searches, history, text messages, iMessages, photography, app data, call logs, voicemail, GPS location data, and much more. In many cases, "deleted" data can be recovered as well, especially if the data can be restored in a timely manner.
CELL PHONE FORENSICS
Because there are so many smart phone models with varied designs, capabilities, and operating systems, it's important to use the right software technology to best collect, preserve, and display the data for each different model.
Standard tools, such as Cellebrite's UFED forensic software, support many different phone and mobile device models. Cell phone forensics may be utilized for cases from homicide, missing persons and death investigations, to embezzlement, harassment, domestic cases and more.

HELPING YOU FIND THE BEST PATH
With state-of-the-art technology and decades of knowledge, our forensic examiners know where to look for relevant information involving many types of cases. We aid in taking large amounts of information and data and focusing in on the elements that are relevant to the matter at hand.
Digital forensics can help in many matters but not all. The type of data, the amount of time since the incident and many other factors can affect the outcome of any digital forensics review. Protus3, with a preliminary review of the issue, will work to provide you or your company, through legal counsel if required, the best path.
Our Services
-
Image cell phones -
Detect malware -
Provide client with easy-to-read report and explain data -
Preserve evidence -
Locate when the information was last accessed -
Analyze logs and data for evidence of intrusion
-
Image desktops -
Consult on sensitive corporate and personal issues involving extortion and bribery -
Provide in depth analysis of raw data -
Recover deleted documents/files -
Recover deleted texts / SMS messages

Our Certifications
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
- Encase Certified Examiner (EnCE)
- Licensed Counterintelligence Service Trainee, North Carolina Private Protective Services
- Licensed Private Investigator, North Carolina Private Protective Services
- Licensed Private Investigator Associate, North Carolina Private Protective Services
- Degrees in Information Technology, Security, Computer Science, Criminology, and Sociology.
Common Questions answered by a Protus3 forensic expert

