BlackBox Forensics

BlackBox Process

Thinking Inside the Box makes everything easier. Our process is simple to explain and execute, with just four steps.
  • Buy a license from one of our partners to use BlackBox Forensics for a single data collection per device.
  • Configure BlackBox. You can choose to capture the whole disc or selected ESI file types based on a date range or relevant groupings such as business documents, e-mails, pictures or video. BlackBox runs on any NTFS-formatted external storage drive 32-bit or higher, using Microsoft Windows® operating systems.*
  • Send and run. Provide the BlackBox-enabled storage device to the data custodian. The custodian plugs the drive into their machine, and hits the Start button. The captured data is automatically encrypted, and an audit log is generated.
  • Return and process. The custodian returns the signed chain-of-custody document and collection device to you for decryption and data processing.

The actual collection process can be completed in as little as two hours when the data custodian is working with a participating BlackBox partner in the same locale.

*BlackBox Forensics runs on Microsoft Windows© XP, 7, 8, 2000 server, 2003 server, 2008 server.