CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

臺灣資安館參展夥伴

Magnet Forensics

Magnet Forensics is a global leader in the development of digital investigation software that acquires, analyzes and shares evidence from smartphones, computers, IoT related devices, and the cloud. Magnet Forensics has been helping examiners and investigators fight crime, protect assets, and guard national security since 2011.

ForensicsCyber CriminalHackers & Threats

Magnet Axiom

AXIOM is the only platform that captures and analyzes smartphone, computer, cloud, IoT, and third-party image data, in a single case file — ensuring that no evidence is missed. AXIOM simplifies investigations by surfacing the most relevant evidence into user-friendly artifacts.

  • Successful Root Cause Analysis Investigations

    Like any digital investigation, no two intrusion analyses are alike. However, also like any digital investigation, good root cause analysis relies on a repeatable, reproducible forensic process that includes correlating logs with computer system artifacts to build strong activity timelines. This Industry Insights Brief explores the three main steps to achieving success in corporate intrusion investigations and root cause analysis.

  • Successful Child Exploitation Investigations

    Child exploitation investigations can be among the most complex owing to multiple devices and storage media, multiple victims, and crimes that can stretch back years. The need to rescue victims and halt distribution can add pressure.
    An efficient, repeatable workflow is key to mitigating these complexities. Download our eBook to learn more about the five main steps to standardizing your process

  • Successful Insider Threat Investigations

    No two insider threat investigations are ever the same—but a standardized process can help them run more smoothly. When you need to prove whether intellectual property, trade secrets, or other sensitive data were exfiltrated, and whether it was done inadvertently, opportunistically, or maliciously, you need an efficient, repeatable workflow. Our new white paper describes three steps that can help you and your organization to conduct more proactive—not purely reactive—investigations

  • 12 Tips for Presenting Digital Evidence in Court

    As integral as digital evidence is to most, if not all, criminal and civil investigations, it’s also easily manipulated. Not only can unexplained gaps in your forensic process diminish your credibility and jeopardize the admissibility of your evidence; your inability to explain even the soundest of processes can be enough to introduce reasonable doubt. The answer: prepare far in advance.

Magnet AXIOM – Helping Examiners Uncover What’s Important

Magnet AXIOM, helping examiners uncover important information. Using tools like Case Dashboard, Magnet.AI, Connections and Portable Case.


Product Type

ForensicsCyber CriminalHackers & Threats