Meet Map Packs: A Totally New Way to Map
With over 300 maps, our deep map catalog is one of our greatest assets. And yet we offer so many maps, it can be hard to even discover them all —
With over 300 maps, our deep map catalog is one of our greatest assets. And yet we offer so many maps, it can be hard to even discover them all —
We’re excited to announce that Magnet Forensics has acquired the strategic IP assets of Comae Technologies, a UAE-based cybersecurity company that
Fresh on the heels of the recent major release of AXIOM Cyber 6.0, we are thrilled to announce the availability of AXIOM Cyber 6.1! AXIOM Cyber 6.1
With AXIOM Cyber you can now get even more Google Drive Activity data from Google Workspace thanks to the ability to collect a record of user
With AXIOM Cyber you can now get even more Google Drive Activity data from Google Workspace thanks to the ability to collect a record of user
Magnet AXIOM 6.1 is now available, helping you automatically surface evidence from even more sources, including the Outlook app, Windows Mail, and
We are proud to announce support for Stream_db_I_e4 and many other updates in DVR Examiner 3.1.5! Download the latest version within DVR
Whether you’re marking water sources, saving prime camping spots, or capturing breathtaking views, waypoints provide an invaluable tool for
Whether you’re marking water sources, saving prime camping spots, or capturing breathtaking views, waypoints provide an invaluable tool for
The version of Lightroom that runs on Mac and Windows (aka “Desktop”) got a small update this week to version 5.3. As usual, these updates
YARA Rule Processing in Magnet AXIOM Cyber for community-driven identification of malware and other indicators of compromise With over 300,000 new
Streamline your investigations with queued remote collections of endpoints. We recognize that time is always at a premium in the world of digital
We’re proud to announce the availability of Magnet AXIOM 6.0! You can upgrade to the latest version within AXIOM or over at the Customer
Warning: Only download the extension in a Chrome profile window launched by selecting the Google Chrome authentication method in AXIOM Process. The
Cloud forensics, investigations that include cloud data, are becoming more common. More and more services are leveraging cloud-based, rather than