Cyber Securities Technology Logo Cyber Security Technologies Corporation (CST) is the innovation leader in affordable software products for computer investigations. CST was formed by industry veterans who see the need for new investigative tools designed for the changing investigative environment. We are dedicated to delivering technically advanced but easy-to-use software products for corporations, government agencies, service providers and law enforcement, as well as related training and certification. CST is an affiliate of Architecture Technology Corporation, a technology company specializing in software-intensive solutions for complex problems in IT security and high-security network computing applications. Learn more...

Who We Are OnLineDFS P2P Marshal In the News

Mac Marshal™ is an analytical forensics product to automate key aspects of the investigation of computers running the Mac OS X operating system.  Mac Marshal automatically detects OS X and Windows operating systems and virtual machine images, and provides the investigator with an array of automated information-gathering and analytical tools to extract Mac-specific forensic evidence from the operating system, the hard drive, and from Mac applications including Mail, Safari, iChat, Address Book and QuickTime Player.

Mac Marshal is available in two software-only versions called the Forensic Edition for Macs and the Forensic Edition for PCs for analyzing hard drive images. The Forensic Edition for Macs runs on a Mac OS X 10.4 or later platform. The Forensic Edition for PCs runs on a Microsoft Windows XP or later platform.

Mac Marshal is also available in a USB 2.0 flash drive version called the Field Edition which can analyze live systems as well as images.  When the Field Edition is used to analyze live systems, it can gather live state information (RAM, running processes, network connections, etc.) that would be lost when seizing the machine and imaging the disk, as well as persistent data from the hard drive. When Field Edition is used to analyze images, it runs on either a Mac OS X 10.4 or later platform or a Microsoft Windows XP or later platform.

Learn more | Training

The OnLine Digital Forensic Suite™ (OnLineDFS for short) is a software product for performing forensic-quality investigations of live computers in networked environments. We built OnLineDFS for IT security professionals, service providers and law enforcement professionals who need to conduct investigations of live computers for:

  • incident response;
  • compliance monitoring;
  • e-discovery;
  • criminal investigations.

The OnLineDFS architecture does not use pre-installed agents on target systems. Thus, OnLineDFS is very simple and inexpensive to deploy, maintain and use, offering the best price/value in the industry.

OnLineDFS is a feature-rich tool which enables an investigator to capture and analyze volatile data (including the memory, running processes, open ports, process/port associations, and much more), as well as the full array of persistent data required for a forensic analysis. Because OnLineDFS was designed for conducting investigations over a network, it enables the investigation of target systems which are geographically remote as well as close-at-hand.

Learn more | Training

P2P Marshal™ is a powerful computer forensics product which automatically detects, extracts and analyzes P2P evidence on computers under investigation. 

P2P Marshal automatically detects a roster of the most commonly-used P2P client programs, and automatically captures and organizes vital forensic information on each client it detects.  P2P Marshal automatically provides the investigator with shared files, downloaded files, peer servers, and configuration and log information for each user on the computer being investigated.  P2P Marshal performs these tasks in a forensically valid way, and presents the results in an easily readable form on-screen and in a format that can easily be incorporated into a report.

P2P Marshal is available in two versions:

  • Forensic Edition, a software product for the investigation of hard drive images; and
  • Field Edition, which comes on a USB 2.0 flash drive, and can be used to investigate live systems as well as images.  It is also readily portable from one computer to another, as the application runs from the flash drive and is not installed on the computer on which it is in use.

Learn more | Training

Press Releases

SC Magazine Awards Finalist 2013

SC Magazine selects Cyber Security Technologies as a Best Computer Forensic Solution finalist in SC Awards 2014
- Press Release 12/15/13

P2P Marshal™ 4.0 Released: Industry-Leading Application for Peer-to-Peer Investigations
- Press Release 11/26/12

Mac Marshal™ Recognized in SC Magazine Annual Awards Europe 2012 as Finalist in the Best Forensics Product Category
- Press Release 6/1/12

Cyber Security Technologies Introduces Release 3.0 of Mac Marshal™
- Press Release 11/18/11

Frost & Sullivan Recognizes Cyber Security Technologies with Product Innovation of the Year Award

- Press Release 12/2/09

Mac Marshal™ from Cyber Security Technologies recognized in SC Magazine Awards Europe 2010 in the category “Information Security Product of the Year"
- Press Release 5/5/10

2009 SC Awards LogoOnLine Digital Forensic Suite (OnLineDFS) from Cyber Security Technologies named finalist in 2009 SC Awards program for “Best Computer Forensics Solution”
- Press Release 12/7/08

Cyber Security Technologies Named 2010 New Technologies and Solutions Finalists by Network Products Guide
- Press Release 1/21/10

Cyber Security Technologies Introduces Release 3.1 of “Peer-to-Peer” Investigation Product, P2P Marshal™
- Press Release 12/13/10

Patent Issued on OnLine Digital Forensic Suite Technology
- Press Release 3/2/09

To Purchase Mac Marshal*, Click Here
To Evaluate Mac Marshal, Click Here

*Software that has been shipped is not returnable or refundable.

Click for more information on Mac Marshal

To Purchase P2P Marshal*, Click Here
To Evaluate P2P Marshal, Click Here

*Software that has been shipped is not returnable or refundable.