The ability to keep in touch with family, business associates, and to access emails are only a few of the reasons for the increasing importance of mobile phones. Today’s technically advanced cell phones are capable of receiving and placing phone calls, storing data, taking pictures, to name just a few of the numerous functions.
Computer Forensics is the preservation, identification, extraction, interpretation, and documentation of computer evidence to include the legal processes, the integrity of evidence, factual reporting of the information found, and the ability to provide an expert opinion in a court of law or other legal proceedings with regards to the findings.
Network Forensics is the capture, recording, storage and analysis of network events to discover the source of security attacks or other problem incidents. The purpose of Network forensics is to record every packet of network traffic to a single searchable repository to examine the traffic in great detail.
Due to the growing nature of the Information Security and Cyber Crime threats, Dynamdre focuses on an Information Security Risk and Vulnerability Management approach that delivers results based on indisputable Information Security Risks and Vulnerabilities, and not just on best practice audits.
Penetration testing or ethical hacking is the process of evaluating a company’s ICT security and incident response systems to determine if there are any exploitable vulnerabilities which can be used harm to the organisation or its reputation.
Dynamdre (Pty) Ltd is an established digital forensic and ICT security service provider. We at Dynamdre strive to provide our clients with quick, innovative and affordable ICT solutions. Where our competitors’ focus is volume driven, Dynamdre‘s processes have been developed to enable quality validations of the investigation conducted no matter the size, and that is what differentiates us from the pack.
Network forensics is a branch of digital forensics. Network forensics relates to the monitoring and analysing of network traffic for the purposes of intruder detection, gathering of information or legally admissible evidence.
Computer forensics is the process of acquiring, verifying, examining and reporting on any computer based evidence.