Forensic technology services

View this page in: Italiano Nowadays, most of financial crimes are perpetrated through information systems. Our forensic technologies experts use technical analysis of accounting data to detect frauds in place and electronic management systems for filing all documents collected.

It has been estimated that about 70% of documentation is available in electronic format only (this documentation will never be printed) consequently there is a need to promote services able to manage, analysis and fill a significant volume of files.

With the support of Data Analysis and Recovery instruments, we are able to investigate thousands of electronic communications and recover, if possible, information presumed to be lost. The investigations team act in coordination with the forensic technology group  in order to deliver the best possible results in a short lead time.

Our services

We assist our clients in solving complexities coming from legal disputes and litigations if it is requested to discover, access, preserve  and analyse electronic data. We are able to recover and analyse in an efficient and effective manner any kind of electronic document, maintaining its integrity and probationary value in compliance with the legal requirements. 
Our services comprise:

  • disk imaging, recovery of existing or deleted data and database acquisition for further investigation or as evidence of a particular event;
  • recovery, scanning and cataloguing of documentation kept in different formats;
  • Electronic Data Room acquisition of electronic data and/or paper-data through scans and arrangement of environmental indexed research with a user-friendly interface;
  • mail acquisition and automated analysis of mails and attachments on the basis of pre-determined events or schemes.

We assist our customers in solving specific needs relating to large amounts of data to examine and re-calculate, examining data with regards to Audit specific needs, and ensuring that corporate data are fully, accurately and completely processed. These requirements can be performed  by our specialists through specific computer procedures, the CAAT procedures (Computer Assisted Audit Procedures).
Our services comprise:

  • performance of anti-fraud specific procedures (ex. SAS99);
  • analysis of company transactions, highlighting exceptions, duplications and/or transaction specific matters;
  • recovery of accounting data, production homogeneous formats and analysis on the basis of pre-determined events and/or schemes;
  • development of strategies for company database normalisation in order to deliver completeness and accuracy of data utilised;
  • support for structured and complex researches and drafting relating reports looking up in electronic format..

The synergy skills between the investigation and forensic technology teams creates the opportunity to offer integrated solutions to support "penal" and "civil" law investigations. We integrate our computer forensic data imaging, recovery and analysis services with a well-established experience gained in the elaboration of documental evidence to support the litigation activities.

We assist our clients during the review process of software licences to support the intellectual property management. Software licensing may be complicated consequently  a correct control activity needs a consolidated experience with the peculiarities of the licensing agreements. Supported by a depth of knowledge of information systems, our experts execute data extrapolation and analysis with the lesser impact on the client's operating activities.

We assist our clients in the review of security management systems and in the standard, laws and regulation requirements. Our experts support our clients to attain:

  • the compliance with current law and regulation requirements;
  • corporate assets protection;
  • effective and efficient management of resources.

Our IT experts have the most sophisticated technological instruments to assist our clients in designing and implementing new security systems, verify the strength of existing systems or star up precautionary measures to prevent systems' disruption and damage, ensuring data reliability, integrity and safety.