Serving clients at 2340 E Trinity Mills Rd Suite 300, Carrollton, Texas 75006 and across North Texas
Computer Forensics Investigations
Network Security Breach & Cyber Threat
With any active cyber threat, it is critical to understand the source and full extent of the network security breach in order to effectively respond and eradicate its presence in your environment. Our Computer Forensics and Network Security Specialists move quickly to capture and analyze data stored in your hard drives, CDs, DVDs, thumb drives and other media formats using industry standard incident response procedures.
Following evidentiary procedures to ensure integrity and admissibility, we will thoroughly investigate the incident while keeping you informed of all results. Computer Forensics and Network Security investigations can be performed during Incident Response Handling or independently, depending on your needs.
Understand the extent of the security breach and the compromise
Determining the source and full extent of a breach is vital to containing the incident and addressing the root cause. You need to know how far a hacker has penetrated your organization and systems, and what has been exfiltrated from your environment. In many cases, this can be accomplished only through in-depth Computer Forensics and Network Security Investigation.
The Allegiant Computer Forensics service gets to the bottom of how your systems were penetrated and what has been compromised. If you suspect systems and sensitive data have been compromised but do not have sufficient evidence to declare an incident, proper Computer Forensics Investigation can help you confirm a breach has occurred.
Ensure the integrity of the Chain of Custody
In the midst of an incident, following evidentiary procedures often is overlooked as your team focuses on containing the problem. This can impair your organization’s ability to provide reliable and useful evidence of the breach to proper authorities.
Our Computer Forensics experts perform a proper forensic investigation of your data storage devices, adhering to standards of evidence and legally admissible proof for criminal proceedings. We provide appropriate Chain of Custody documentation for systems, images or data acquired during the investigation. In addition, our investigators prepare reports or forensic evidence for appropriate law enforcement or investigating government agency upon request.
If your organization has become a victim of a security breach, or suspects a breach has occurred, contact Allegiant immediately at (469) 892-8256.
Expert forensic services for computers, mobile devices, business networks, and home networks.
Our digital forensics investigators help companies and individuals respond to incidents and litigation where electronic data may play a role in substantiating claims or proving actions. Our experts provide assistance in the identification, preservation, and analysis of all forms of electronic data residing on mobile and cellular devices, computer or server systems, or cloud storage.
During investigations, we routinely assist in matters related to the misuse of confidential data, employee misconduct, non-compete and employment contract disputes, insurance fraud, digital image analysis, mobile and cellular device analysis, and electronic document collection and production. The data collected and analyzed will aid in the successful investigation and litigation of complex matters.
Whether you need to collect data from multiple locations around the globe or just a single location, our team of certified experts can help respond to regulatory and legal requirements in the most cost-effective, efficient and forensically sound manner. We can consult on and design an approach based on your objectives, develop an inventory of the universe of potentially responsive data, and acquire data from nearly every file type and source, using proven technology and forensically sound methods.
We can satisfy your requirements for filtering and early case assessment. We offer:
- Native file processing, TIFF and native file production
- All metadata, text, embedded objects and domains processing
- Filtering based on objective and subjective criteria
- Support for virtually any file type, including legacy, non-standard email formats, corrupt files, password-protected, encrypted files, Bloomberg data, chat, SharePoint, audio and video files
- Identification and processing of hundreds of languages, with full Unicode compliance
- Rigorous quality control and chain-of-custody protocols
Our technology offers advanced analytical features to cull data efficiently and effectively, increasing the speed and accuracy of your review. Analytics are fully integrated into our platforms, to inform you earlier in the process of other strengths and weaknesses of your case.
Highly Qualified and Experienced Digital Forensic Expert
Expert in Computer Forensics, Network Security, Penetration Testing – Dr. Chuck Easttom
Our Computer Forensics, Forensic File Recovery, Network Security and Penetration Testing services are directed by one of the most highly qualified Computer Forensics and Computer Science experts in Texas. Dr. Easttom is an expert in Forensic Science, Computer Forensics, Mobile Forensics, Network Security, Penetration Testing, Forensic File Recovery, Cryptography, and related topics. He has extensive experience in training law enforcement and computer forensics professionals, as well as a long history of testifying in court as an expert witness. You can view is entire CV here.
Dr. Easttom’s forensic qualifications and experience include:
- 55 industry certifications including
- 20 cyber security/forensics/pen testing certifications (CISSP, CASP, CEH, CHFI, CySA+, Pentest+ and others)
- Programming/web development/database certifications (MCSA, MCSE, MCAD, etc.)
- Operating system/network certifications (Network+, A+, Linux+, Windows Server, etc.)
- Certified Cyber Forensic Professional (ISC2)
- Certified Hacking Forensic Investigator (EC Council)
- Certified Criminal Investigator – American College of Forensic Examiners
- Certified in the Forensic Examination of CCTV Digital VTR Surveillance Recording Equipment – American College of Forensic Examiners
- Certified in Oxygen Certified Phone Forensics
- Experienced with many forensic tools including Encase, FTK, OSForensics, Oxygen, Paraben, BlackLight, and others.
- Authored 27 computer science related books on topics such as programming, web development, operating systems, digital forensics, cryptography, and cyber security. These are from publishers such as Pearson, McGraw Hill, Jones Bartlett, etc. Many of these are used as textbooks at universities, in over 60 universities around the world and have been translated into multiple languages including Mandarin, Korean, and German.
- Frequently teaches forensics including to state, local, and federal law enforcement as well as friendly foreign governments.
- His computer security and forensics courses are approved by the U.S. Department of Homeland Security National Initiative For Cyber Security Careers and Studies (NICCS).
- Extensive experience testifying in court as an expert witness.
- Published over 60 scientific papers on topics such as cryptography, digital forensics, cyber warfare, and cyber security including “Introduction to Windows Registry Forensics”, “Introduction to Phone Forensics”, and “The History of Computer Crime“.
- Holds 19 computer science related patents.