Magnet Axiom Cyber
An excellent solution for corporations that perform remote acquisitions as well as collect and analyze evidence from cloud storage and communication services, computers and mobile devices.

Magnet Axiom Cyber

  • Supports evidence collection on computers, mobile devices, cloud and other sources of evidence.
  • Fulfill the needs in cloud data collection, preservation, analysis, and so on.
  • Secure the evidence through remote data collection, enhance the efficiency in your case solving.

Magnet Axiom Cyber is the latest solution by Magnet that you can use to acquire evidence from remote computers, local computers, mobile devices, and cloud. Furthermore, Magnet Axiom Cyber also integrated several functions into this one solution, as it can perform remote acquisitions as well as collect and analyze evidence from cloud storage and communication services, computers and mobile devices. All you have to do is inject an agent into the target device, then you are ready for remote data collection, analysis, etc. Magnet Axiom Cyber supports multiple sources of evidences, incl. computers (local and remote; supporting both Windows and Mac), mobile devices (Android and iOS), clouds, etc. Magnet Axiom Cyber also supports report generation to enhance your case solving efficiency.

Description
  • Acquire evidence from remote computers for investigations such as data ex-filtration, employee misconduct, and root cause analysis.
  • Conduct remote acquisition of drives (Windows only), memory (Windows only), and logical files from the file system even if the drive is encrypted.
  • Recover data from mobile, computer, and cloud evidence sources ensuring no evidence is missed.
  • Simplify and expedite memory analysis with Volatility and automatically discover the correct memory profile.
  • Use the Passware plugin to decrypt evidence sources such as McAfee or Bitlocker-encrypted drive. You can decrypt software-encrypted evidence from an APFS-formatted macOS computer without requiring the Passware plugin.
  • Review more cloud evidence by easily accessing accounts using administrator credentials allowing you to preserve valuable metadata such as timestamps and access logs, and review user activities in audit logs.
  • Visualize key evidence and relationships between targets to learn where files came from and where they went and prove intent by showing when files were opened, modified, and where they were sent.
  • Easily present evidence to non-technical stakeholders in an easy to understand format.