<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=3026858&amp;fmt=gif">

1 min read

Compression & Encryption are available in Binalyze AIR

Featured Image

Since efficiency and simplicity are at the core of Binalyze solutions, in this product release we incorporated the compression and encryption feature.

It is a very straightforward feature where its main purpose is to reduce network bandwidth, reduce file size to save disk capacity and encryption as its name says for increased security.

Here is how you can enable Compression & Encryption:

  1. Go to your AIR Dashboard, choose any endpoint, and click on “Acquire”

Digital forensics compression and encryption

2. Under options select “Use custom options” and in the “Compression & Encryption” section click on “Configure”

enterprise forensics Binalyze

3. Here you can enable the Compression and Encryption features separately as desired. Once you enable the Encryption module you will type a password that will be used to unlock the evidence files which are encrypted using AES 256.

Incident response

Now you are ready to go. Click on the start button and AIR Endpoint will start acquiring evidence. Once the evidence files are acquired, based on configurations that you have defined previously, files will be stored in the location you choose.

Watch a demo of Binalyze AIR 1.7.35 new product release where our founder Emre Tinaztepe demos the new feature highlights.

To download the update visit here.

 

How to perform compromise assessment with 1 click?

Compromise assessment is an analysis of a network of endpoints or a single endpoint to uncover unknown security breaches, malware, and any sign of...

Read More

Microsoft Exchange Server Vulnerability Scanner (CVE-2021-42321)

UPDATE 15.11.2021.

Microsoft patches actively exploited Exchange, Excel zero-days (CVE-2021-42321). Please refer to their site for more details. 

...

Read More

The Tenth Step to Forensic Readiness: Legal review

When we plan our incident response strategies and forensic readiness steps, we strongly pay attention to digital evidence acquisition, storage,...

Read More