No videos were found.
FTK now delivers native encryption, decryption and processing of encrypted forensic evidence archives, such as AD1, E0 and S01. Prior to this feature, examiners had to manually encrypt and decrypt the digital evidence as a secondary process or purchase special hardware. This often meant that evidence was never encrypted as part of a standard process, increasing risk during transport and storage. Now, computer forensics examiners can quickly and easily as part of an integrated process encrypt, decrypt and process evidence without the use of additional software or hardware.