Data management tools
Compare Cyan Examiner and Cyan Responder
For Forensic Analysts
For Frontline Staff
Both Cyan Examiner and Cyan Responder can be used with a forensics PC/laptop through a write blocker, on the target device using bootable media, or running live on the target device.
Suitable for all Forensic Scenarios
Cyan Examiner and Cyan Responder support a variety of use cases, to support your search process and procedures.
lock Write Blocked
A write blocker is used with a forensics PC or laptop to scan a drive that has been removed from a suspect’s computer.
- Best forensic integrity.
- Must disassemble computer.
usb Bootable Media
A USB key containing the software on a live boot forensic OS image is used on the suspect’s computer, without removing the disk drives.
- Scan without needing to disassemble the target device.
- Software write blocking.
play_circle_filled Run Live
The software is run from the USB stick on powered up machines.
- Access all mounted volumes without reboot, including encrypted volumes. Good for offender management visits
- Reduced forensic integrity.