image

An important role of Database Forensics

Databases are the fundamentals of the current software applications which contain completed data that might be the crucial clues to disclose the truth, and important evidence to identify the crime. But database operator is required to have strong technical knowledge or background in database so this software is exactly helpful for user who is not senior in this filed. With our product, the user can acquire the underlying data from the database files more easily in a forensically sound manner, and bypass the password of the regarding application. Get close to the crime clues.

icon

High requirement for the database knowledge

icon

Expensive to employ the database expert

icon

Strong compatibility for various relational or non-relational database types

icon

Reconstruction and recovery the abnormal database files(deleted/corrupted/fragmented)

icon

Visualized analysis function

icon

Forensically sounder manner

image
bg brief
image

Database Forensic Analysis System

DBF series is the globally leading first database forensic product specializing in this field which covers the main types of relational&non-relational databases now. This series aims to resolve the problems of deleted /corrupted/fragmented database files, false file systems, and restriction of application system accessibility. Investigators are capable of utilizing the DBF series to conduct the preview, recovery, extraction, reorganization, analysis, and export operations to the database files involved in the cases independently without the assistance of any expensive expert or configuration regarding the environment. DBF series is an ideal time & cost-effective solution which has to be widely used in related jobs.

Unrestricted Accessibility to the database files no need for password & account info from the application system or pre-configuration of regarding database environment.

 

Extraction and Recovery for the normal/deleted/damaged database files, including the objects like tables, views, stored procedures, triggers, functions

image

Multiple Analysis Functions such as keyword search, filtering, statistics, SQL statement query, and visual connection analysis. Supports to analyze the database log files of MySQL, SQL Server, Oracle, MongoDB, Elasticsearch, Hbase …

image

Patented File Carving Technology supports directly extracting, analyzing, and reorganizing the fragmented database files from the storage mediums or image files.

image

The hierarchical Relationship Analytical Tool supports generating and deriving hierarchical relationship maps.

 

Cloud Database Analytical and Conversion Tool supports the analysis of the MySQL database backup files (.xb) of Alibaba Cloud, Tencent Cloud, and Huawei Cloud, and export them to database files in conventional formats.

Forensic Reports Generation in HTML & PDF formats.

Exporting the Recovered or De-Duplicated Database Files.

image

Software Operation Preview

image

image

image

image

image

image

image

image

image

image

image

image

One product, endless potential

Save you from the expensive and time-consuming processes and give you smarter database forensics at lower cost

What do customers say about our software?

Get deeper into the niche!

Knowledge
image
How Can Forensic Advantage Revolutionize Investigations, Litigation, and Cybersecurity?
2023-06-07
How Can Forensic Advantage Revolutionize Investigations, Litigation, and Cybersecurity?
2023-06-07

This article is about to know what forensic advantage means, and its usefulness in criminal investigations,court cases, financial fraud and cybersecurity.

Knowledge
image
SQL Server Transaction Logs: What Law Enforcement Investigators Need to Know
2022-07-13
SQL Server Transaction Logs: What Law Enforcement Investigators Need to Know
2022-07-13

Knowing the basics of SQL server transaction logs is paramount to leading a successful forensics database investigation.

Technical Tips
image
11 Database Security Practices and Disaster Prevention Tips
2022-06-20
11 Database Security Practices and Disaster Prevention Tips
2022-06-20

A substantial portion of database security comes down to you, your knowledge, and your willingness to implement the cyber security defenses necessary to keep malicious actors at bay.

Crime Cases
image
6 Types of Database Attacks Hackers Use to Obtain Unauthorized Access
2022-06-13
6 Types of Database Attacks Hackers Use to Obtain Unauthorized Access
2022-06-13

When it comes to database attacks, hackers and would-be criminals often resort to a wide array of techniques, which is the database forensics cares for.

Apply Free-Trial

Bring the power of SalvationDATA patented technology, get a free trial and see Database Forensic Analysis System in action today!