Secure View 3 from mobile forensics solutions provider Susteen (News - Alert) offers support to Microsoft's Windows 8 platforms. This announcement enables law enforcement, military and corporate security consultants to deploy Secure View for Forensics on any computer running Windows 8.
“Susteen remains truthful to its positioning as software solution provider which entails support of the latest computer platforms. Our goal is to fully meet the IT needs currently challenged with the BYOD (Bring Your Own Device) trend,” said Hiroyuki Maruyama, CEO/president of Susteen.
Users can leverage Secure View for Forensics to extract, disseminate, analyze and report relevant data from mobile phones.
This robust analytical tool features multiple keywords search of extracted data across all content types and multiple handsets at the same time. It allows timeline analysis on all data sets; list cell phone activities by frequency; enables graphical illustration of phone activities in hour by hour data or by daily data.
Secure View for Forensics can identify date, time, file name and pixels and possible GPS coordinates with META geo tags of pictures taken by cell phones; and breaks down phone Web activity data by time, date and website links, including social network activity.
This tool also allows users to identify similar pictures from multiple phones.
Susteen notes that Secure View acquires data from more than 95 percent of the phones released in the U.S. & Canada since year 2000, independent of platform.
Susteen aims to enhance data communications through multilevel applications and develop products that provide convenience to the client through technological innovations. The company was in news earlier this year for announcing an affordable MFEP for educational institutions.
MFEP enables qualified organizations to utilize Susteen's "Secure View" technology to train students the mobile forensics tool in the market. Susteen claims this program can offer savings that translate up to a 90 percent discount, while maintaining full functionality.
Edited by Rachel Ramsey