
Search Tool Comparison Chart
For Forensic Analysts | For Frontline Staff | For Frontline Staff | For Frontline Staff |
|
Red/Green Results | ![]() | ![]() | ![]() | ![]() |
PDF Report | ![]() | ![]() | option | ![]() |
Image Preview | ![]() | ![]() | option | ![]() |
Fully Configurable | ![]() | ![]() | ||
Pre Configurable | ![]() | ![]() |
||
Simplified UI | ![]() | ![]() |
Both Cyan Examiner and Cyan Responder can be used with a forensics PC/laptop through a write blocker, on the target device using bootable media, or running live on the target device.
Suitable for all Triage Scenarios
Cyan Forensics technology supports a variety of use cases, to support your search process and procedures
lock Write Blocked
A write blocker is used with a forensics PC or laptop to scan a drive that has been removed from a suspect’s computer.
- Best forensic integrity.
- Must disassemble computer.
usb Bootable Media
A USB key containing the software on a live boot forensic OS image is used on the suspect’s computer, without removing the disk drives.
- Scan without needing to disassemble the target device.
- Software write blocking.
play_circle_filled Run Live
The software is run from the USB stick on powered up machines.
- Access all mounted volumes without reboot, including encrypted volumes. Good for offender management visits
- Reduced forensic integrity.