Projects

Nothing speaks more to Catzen Forensic’s capabilities in computer forensics than examples of our work and the testimonials of our clients.

Forensic analysis of multiple compters and devices deployed to prove deed fraud.

A series of deeds were filed with the county and dated, notarized and signed at a point where council for the plaintiff believed that the deeds were not yet created. Read more

Data Recovery critical in reclaiming 4 Raid Arrays with 100% of data recovered.

A vendor in the software services industry located in New York sustained the loss of 4 raid arrays in a mission critical server. Lack of a suitable backup, and old technology on an obsolete and failed controller made the task more difficult. Read more

Data Destruction necessary to delete stolen documents and keep financial information secure.

A large financial services company claimed an employee removed sensitive documents upon their departure. Catzen Forensic was retained as part of the settlement agreement to locate those documents. Read more

E-discovery (ESI) by Catzen locates documents in 24 hours; found the “needle in a haystack.”

Catzen Forensic was engaged to locate documents for a $40MM lawsuit. The engagement involved the collection and searching of 3.8 TB as directed by the Court within 24 hours. The collection involved multiple platforms and 6 custodians. Read more

Data discovery allows evidence to be preserved in case of future litigation.

A class action lawsuit involving a multi-billion dollar corporate merger required data preservation and extraction of a board member’s computer and other external media. Catzen Forensic, who responded within 24 hours of the original call from the New York-based client,  was selected to image the computer hard drive and other media and perform an on-site search for case specific data. Read more

Proof of system invasion leads to legal termination of employee.

Bank IT Employee used administrative access to acquire their HR performance review. Catzen Forensic was retained to provide methodology and chronology of how the file was acquired, Read more