Magnet AXIOM 1.2 Is Here With AXIOM Cloud, Connections And More!

Welcome to the most comprehensive, integrated digital investigation platform.

Magnet AXIOM 1.2 is now available for customers to download — including Connections, a powerful way of visually mapping the story of a file or artifact, and the ability to integrate our latest product: Magnet AXIOM Cloud.

Combine and seamlessly integrate evidence from a variety of sources, whether it’s from smartphones, computers, or the cloud, and analyze them all in AXIOM to create a thorough and streamlined experience.

Connections

Connections is a new feature that simplifies the discovery and visualization of relationships between files and artifacts, their attributes and their activity. It leverages AXIOM’s ability to pull cloud data, smartphone data, and computer data into a single case file to follow a key piece of evidence and connect it to devices, suspects and other artifacts.Get a quick overview of Connections in this video: Magnet AXIOM Connections

Once an examiner understands the full story of a file, they can review key OS artifacts such as shellbags, Jump Lists, and lnk files to prove attribution. The OS artifacts help identify where the file was stored, if it was opened, and if shortcuts were created.

Additionally, investigative teams will be able to use Connections to:


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

– Discover relevant “secondary” pieces of evidence
– Learn where evidence came from
– See where evidence is currently located
– Discover how evidence was shared – transfers, emails, texts, etc.
– See who evidence was shared with
– Map out communications between contacts

For more information on Connections, register for our upcoming webinar, “Connecting The Dots Between Artifacts and User Activity” on October 10.

Magnet AXIOM Cloud

With AXIOM Cloud, you can recover digital evidence from forensically-relevant cloud services and social media networks quickly and intuitively. You can easily add cloud data to existing case data from other sources for a more complete view.

AXIOM Cloud is the only solution that leverages cloud, computer, and smartphone artifacts to examine cloud data. This unique capability allows examiners to extract cloud evidence regardless of the file type (e.g., .doc, .xls, .PDF) and pull more evidence from cloud sources than any solution.

AXIOM Cloud is also the only cloud forensics tool to support two-factor authorization on Google and iCloud services.

Using AXIOM Cloud, you can extract data from a number of cloud-services and social media networks, such as:

– iCloud
– Google services (e.g. GSuite: Google Drive, Gmail, Google Photos, etc.)
– OneDrive
– DropBox
– Office 365
– Facebook
– Twitter
– Instagram
– And more!

In the same way as AXIOM Computer and AXIOM Smartphone, AXIOM Cloud utilizes the power of AXIOM to analyze and report on the evidence — saving examiners hours of time in the process.

Learn more about the impact of cloud artifacts in digital forensics in an upcoming webinar on September 26 & 27.

You can also find out more Magnet AXIOM Cloud here and check out a guided walk through of AXIOM Cloud in this video: Acquiring and Analyzing Cloud Data in Magnet AXIOM.

Leave a Comment

Latest Videos

Data Extraction From UNISOC-Based Devices In Oxygen Forensic® Detective

Forensic Focus 16th November 2023 3:08 pm

Si and Desi talk to Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation, and Emma Pickering, Head of Tech and Economic Abuse at Refuge. They discuss the impact of digital forensics and incident response (DFIR) in cases of domestic abuse. They highlight the prevalence of tech-enabled abuse, such as the use of stalkerware, and the need for comprehensive support and safety plans for survivors. 

They also talk about the challenges faced by law enforcement in investigating and prosecuting these cases, as well as the importance of training and awareness in addressing tech-enabled abuse. The conversation emphasizes the need for collaboration between organizations, tech developers, and law enforcement to effectively combat domestic abuse.

Show Notes:

Apple Support: How Safety Check on iPhone works to keep you safe - https://support.apple.com/guide/personal-safety/how-safety-check-works-ips2aad835e1/web
IBM: Five Technology Design Principles to Combat Domestic Abuse - https://www.ibm.com/policy/five-technology-design-principles-to-combat-domestic-abuse/
EFF: Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users  - https://www.eff.org/deeplinks/2023/09/today-uk-parliament-undermined-privacy-security-and-freedom-all-internet-users
Wesley Mission: More support to help escape family violence - https://www.wesleymission.org.au/about-us/what-we-do/helping-people-most-in-need/housing-and-accommodation/wesley-emergency-relief/more-support-to-help-escape-family-violence/
Refuge: How we can help you - https://refuge.org.uk/i-need-help-now/how-we-can-help-you/
Electronic Frontier Foundation - https://www.eff.org/

Si and Desi talk to Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation, and Emma Pickering, Head of Tech and Economic Abuse at Refuge. They discuss the impact of digital forensics and incident response (DFIR) in cases of domestic abuse. They highlight the prevalence of tech-enabled abuse, such as the use of stalkerware, and the need for comprehensive support and safety plans for survivors.

They also talk about the challenges faced by law enforcement in investigating and prosecuting these cases, as well as the importance of training and awareness in addressing tech-enabled abuse. The conversation emphasizes the need for collaboration between organizations, tech developers, and law enforcement to effectively combat domestic abuse.

Show Notes:

Apple Support: How Safety Check on iPhone works to keep you safe - https://support.apple.com/guide/personal-safety/how-safety-check-works-ips2aad835e1/web
IBM: Five Technology Design Principles to Combat Domestic Abuse - https://www.ibm.com/policy/five-technology-design-principles-to-combat-domestic-abuse/
EFF: Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users - https://www.eff.org/deeplinks/2023/09/today-uk-parliament-undermined-privacy-security-and-freedom-all-internet-users
Wesley Mission: More support to help escape family violence - https://www.wesleymission.org.au/about-us/what-we-do/helping-people-most-in-need/housing-and-accommodation/wesley-emergency-relief/more-support-to-help-escape-family-violence/
Refuge: How we can help you - https://refuge.org.uk/i-need-help-now/how-we-can-help-you/
Electronic Frontier Foundation - https://www.eff.org/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_nSWQZe9gpVk

Protecting Victims From Stalkerware And Tech-Enabled Abuse

Forensic Focus 15th November 2023 11:11 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles