Analytic & Forensic Technology

Identifying, retrieving and analysing electronic data efficiently and effectively

We use technology to gather and analyse large data sets with forensic rigour, ensuring that clients can rely on our outputs and know that relevant information has been reviewed expertly.

We enable our clients to gather information that can be used effectively to conduct investigations, negotiate with regulators and settle disputes.

Computer forensics

Computer Forensics involves the securing, documentation and analysis of digital evidence from electronic devices and networks that if required can be produced in Court. This includes hard drives, mobile devices, fax machines and network traffic – in short, all digitally-stored data. Computer Forensics is typically applied to isolated computer equipment where a user’s actions will be tracked, such as file creation, modification or deletion of data or illicit communication. Recovering deleted and lost data, and encryption analysis, is also part of this service. Those techniques support investigations in the fields of data theft, e-mail tracing, network intrusion and intellectual property. If required, we can compile an expert opinion that can be used in Court. 

Data analytics & E-Discovery

With advanced database tools and techniques, and using our in-house tool DTect, we provide incredible insight into massive data sets, often in search of unusual or suspicious transactions or other similar analysis of sales and purchase databases, journals, inventory, payroll and expenses, IT records, CRM systems and payment data extracted from financial systems (like Oracle and SAP). Working on the basis of a series of specially adapted indicators, large quantities of data can be examined and assessed for suspicion within a very short time. DTect is our globally recognised fraud analysis suite. “Next generation” advanced analytics (predictive, neural analysis and Self Organising Maps) can also be provided to clients.

Our E-Discovery solution permits structured multi-user access to large quantities of digital data (e-mails and electronic files) through the use of appropriate information clusters. The flood of digital information can be reduced by up to 80% through the use of our data processing and filtering techniques.