Digital Forensics




Cyber Crime Scene Investigation (CyberCSI)



Cyber Crime Scene Investigation (CyberCSI) is a service provided to the Law Enforcement Agencies (LEA). This service focuses on investigation and prosecution for criminal case. It includes:


  1. Onsite Digital Evidence Preservation

  2. Digital Evidence Analysis

  3. Expert Witness





Cyber Discovery



CyberDiscovery is a service offered to individual and private organization. It addresses concern on Electronic Stored Information (ESI) in order to provide solution to civil litigation. It includes the following services:


  1. Onsite Digital Evidence Preservation

  2. Digital Evidence Analysis

  3. Expert Witness





Cyber Detect, Eradicate and Forensics (CyberDEF)



Cyber Detect, Eradicate and Forensics (CyberDEF) provides a pro-active cyber defense forensics service to mitigate operational issues in cyberspace. This service is offered to Critical National Information Infrastructure (CNII) organizations sectors such as the government, banking and finance, information and communication and health services.

Emphasizing on forensic readiness aspect, CyberDEF identifies holistic solutions for cyber intrusion, APT malware and ransomware by detecting threat, eradicate source and conduct forensic investigation to outline potential cause.






Expert Development & Consultancy



Expert Development & Consultancy focuses on research and development of cyber forensics. Under this service, we welcome any partnerships with local and international parties to accelerate the development of cyber forensics. We also provide consultancy service to support client’s business needs.





We are committed to provide quality and accurate forensics outcome in line with international requirement ISO 17025. We are proud to tell you that we have been accredited with ANSI National Accreditation Board (ANAB) since 2011.



Categories Of Digital Forensics


Media and file system forensics

Examines data in all digital storage media including hard drives, USB flash drive, flash memory card, compact disc and many more.

Operating system forensics

Examines operating systems including Windows, Mac OS or Linux.

Web and email forensics

Examines web cookies, browser history, and other items that can help locate and identify email account administrator.

Social network forensics

Examines pertinent social media data of a social media profile.

Database and malware forensics

Examines the collection and access of data within pertinent databases and malicious codes or software.

Network forensics

Examines network traffic data and cyber-attacks such as intrusions within computer or digital networks.

Mobile device forensics

Examines different types of data collected in mobile devices including smartphones, tablet computer or IoT devices.

Multimedia forensics

Examines the authenticity and content analysis of multimedia file, including identification of a person or an object.

Software forensics

Examines software or source codes author information behind a specific software.

Cloud forensics

Probes and examines cyber-attacks and other pertinent data within cloud systems.

Virtual systems forensics

Examines and valuates the data and collection of virtual machines.