Data Collection

The forensic acquisition of data is not only the first, hands on step, but one of the most important. Our forensic professionals can collect evidentiary sound data while on-site, potentially remotely, including data from cloud-based applications. For computer forensics matters to be executed properly, the data collection step is the critical groundwork for all steps that follow and must include:

  • Intact metadata
  • Preserved logs
  • Tracked Chain of Custody
  • Verified data
  • Proper documentation

Digital Mountain’s team of computer forensics experts with backgrounds primarily in law enforcement, eDiscovery professionals, and cybersecurity innovators, as well as career enterprise storage and enterprise application engineers provide our customers with the expertise and the experience to stand above our competitors. These professionals use the best commercially available tools and have the most up-to-date training available in the industry.

Our experts collect evidence from a variety of storage media such as hard drives, legacy tape systems, CD/DVDs, storage arrays, smart devices and cellular phones. Environments such as Windows, Macintosh, Linux are all easily navigated. We also have specialists based on cloud-based storage systems such as Box or DropBox, cloud-based email and collaboration systems such as O365, GSuite, Slack, Jira or Zoom and other cloud-based applications such as Salesforce, Workday, QuickBooks, etc.