top of page

Every Minute Counts When You Are Hit With A Cyber Attack.


Radically Reduce Time-to-Discovery and Identification of Malware, Viruses, Rootkits & Trojans Using Our Comprehensive Patented Solution In A White-Glove Forensic Lab, Onsite, or Cloud Environment.


01 / FAST

The Poneman institute's 2019 Cost of Cybercrime Study in the US identified that 35 percent of a company's cost to resolve a cyber attack is related to detection, significantly more than any other cost.

Gartner has estimated that 10 to 20 percent of malware is not detected by most off-the-shelf malware detection engines.

Forensic Scan's patented hardware-software solution simultaneously runs more than 55 commercial malware engines enabling malware discovery and identification more than 50 times faster with more accurate and reliable coverage.

Simultaneously running two or more anti-malware engines neutralizes each engine and stops the scan. Sequentially running 50 or more malware engines takes too much time in time-sensitive cyber attack situations.

Forensic Scan uses market leading commercial anti-malware software in an innovative and patented solution that scans all boot sectors and hidden files and  detects and identifies the malware, viruses, trojans and rootkits known to the anti-malware community.

Whether you use our secure white room forensic laboratory, prefer onsite use, or like our cloud solution, you can trust that with  35+ years in cybersecurity, analysis, and prevention, our cybersecurity experts treat your sensitive and proprietary data as our own.

We perform comprehensive simultaneous forensic scans on forensic copies of storage devices, hard drives, and RAID arrays.

Our platform exceeds current regulatory compliance requirements and provides a robust written and defensible audit trail.

"Over the next 5 years, companies in the private sector "risk losing an estimated US $5.2 Trillion - almost the size of the economies of France, Italy and Spain combined - in value creation opportunities from the digital economy due to cybersecurity attacks."
Accenture, Securing The World's Digital Economy, 2019



As cyber security threats and the cost of remediation increase, all organizations confront issues of detection and remediation in context of data and revenue loss, customer retention and shareholder value.

With 35+ years of experience in cyber security, our team knew that time-to-discovery and identification was the single most important factor that directly influenced speed of remediation and could help minimize business impacts.

We recognized a distinct gap offered by current tools and the need for time-sensitive and cost-efficient solutions.


We use familiar technology in a new way. We don’t use anything exotic or new. Instead, we achieve powerful results with methods and tools common to forensic computing and malware identification professionals.

  • Industry-standard hardware built by Dell®, HP® or IBM®

  • Proprietary patented C++ software developed in the U.S. by skilled developers

  • Commercially available malware detection software applications

  • Standardized reporting across all malware packages in a single presentation


Whether we analyze your storage device at our secure forensic laboratory or your location, we go to great lengths to keep your data safe.

  • Your storage device is never compromised. 

  • You create encrypted copies and we use the copies for analysis.

  • Your storage device—the original—is never scanned or analyzed in any way.

  • Our clean secure environment ensures that your storage devices are safe 24/7.

  • Senior security analysts supervise the scan in our private laboratory or your IT facility

Cybercrime doesn’t keep bankers’ hours and neither do we. We work internationally, in public and private sector organizations, and on your time requirements. Our team is as flexible as your needs require.  Our team is comprised of highly skilled forensic computing specialists who are capable of handling emergency situations as well as routine preventative review. Contact us for more information about how we can help you prevent and respond to cybersecurity intrusions in your organization.



Forensic Scan provides 10-50X Quicker Time-to-Discovery and More Accurate Identification

  • Patented next generation hardware-software malware identification platform.

  • Diagnoses and identifies if known malicious cyber threats including malware, viruses, Trojans and rootkits have breached a corporate firewall.

  • Diagnoses servers, workstations, payment machines, virtual machines, desktop or laptop PCs, and mobile devices.

  • Scans deleted files and folders.

  • Diagnoses Windows, Unix, Linux, Android and iOS operating systems.





Dedicated secure clean room in our high-security building staffed with senior cybersecurity experts. We scan a forensic copy of your storage device, never your original.

Dedicated server installed at your location so you can easily and cost-efficiently scan as many storage devices as you need. Dedicated onsite technical support.

Secure cloud-based scanning of multiple files and folders at your discretion and need. Ideal for hard drives up to 2TB. Same technology as in our forensic lab or onsite. Available summer 2020. 



  • Quicker Time-to-Discovery

  • Lower Cost of Discovery

  • Rapid and More Accurate Identification

  • Comprehensive Coverage

  • Faster Recovery

  • Improved Network Security

  • Increased Reliability

  • Faster Return to Pre-Breach State

  • Rapidly Restore Critical Business Operations

  • Reduced Damage to Brand

  • Source Data Protected

  • Enhanced Business Security

  • Detailed, Easy-to-Read Report

  • Robust Defensible Audit Trail

  • Automated logical process;
    No human errors

"They Will Get In."

"There are only two kinds of companies: those who have been breached and know it and those who have been breached and don't. Which one are you? Forget prevention. Know they are going to get in.  You need to be thinking, I need to find it as fast as humanly possible, contain it and remediate it."

Ted Schlein

Kleiner Perkins, Caufield

WSJ CIO Conference 2014




If you have been the victim of a cyberattack, contact us for a free no-obligation assessment of how Forensic Scan can help you quickly and cost-efficiently detect and identify the threat and get you back up and running with minimal business impact.

Contact Us

Thanks for submitting!

Time-to-discovery and identification are the most critical activities that every company must do to reduce remediation costs and limit losses.

bottom of page