Our Services

[iconbox title=”IT Forensic Services” link=”|||” iclass=”box-shadow-2″ icon=”fa fa-tv”]✓ Digital Forensics
✓ Mobile Phone Forensics
✓ Database Forensics
✓ DVR Forensics
✓ Cell Site Analysis
✓ Data Recovery[/iconbox]
[iconbox title=”Cyber-Security” link=”|||” icon=”fa fa-user-secret” iclass=”box-shadow-2″]◘ Advisory
◘ Assessment
◘ Incident Response
◘ Penetration Testing
◘ Security Audit
◘ Vulnerability Assessments[/iconbox]
[iconbox title=”Risk Management Consultancy” link=”|||” iclass=”box-shadow-2″ icon=”fa fa-briefcase”]✓ Forensic Audits
✓ Forensic Accounting
✓ Forensic Investigation
✓ Fraud Investigation
✓ Auditing[/iconbox]
[iconbox title=”Cloud Services” link=”|||” icon=”fa fa-cloud” iclass=”box-shadow-2″]◘ Cloud Services
◘ Cloud Hosting Services
◘ Cloud Consultancy
◘ Cloud Applications
◘ Disaster Recovery & Backup[/iconbox]
[iconbox title=”Forensic Science” link=”|||” icon=”fa fa-user-md” iclass=”box-shadow-2″]◘ Autopsy
◘ Crime Scene Reconstruction
◘ Arson and Fire
◘ Rape Cases
◘ Toxicology
◘ DNA Forensics
◘ Drug Forensics[/iconbox]
[iconbox title=”Corporate Investigations” link=”|||” icon=”fa fa-database” iclass=”box-shadow-2″]◘ Data Theft
◘ Forensic Investigations
◘ Digital Forensic Investigations
◘ Social Media Investigations
◘ Employee Investigations
◘ Data Recovery
◘ Document Analysis[/iconbox]
[iconbox title=”Software Solutions” link=”|||” icon=”fa fa-qrcode” iclass=”box-shadow-2″]✓ SalvationData
✓ Malwarebytes
✓ Endpoint Protector
✓ Event log Analyser[/iconbox]
[iconbox title=”Supply and Distribution” link=”|||” iclass=”box-shadow-2″ icon=”fa fa-life-ring”]✓SalvationData Forensic Equipment
✓Pcs, Laptops
✓Computer Consumables
✓Network Equipment
✓Servers, Spares[/iconbox]