Our product catalog details the key offerings for desktop, mobile, and cloud forensics. Our solutions have been tailored to fit your goals and objectives perfectly. You can add your contacts to our product catalog and use it in business meetings and negotiations with your customers.
Learn more about our recent product updates and use our release notes in a printable PDF format to easily share the news with your clients.
Recent notes:
Complement your business by using these bright booklets describing our solutions and offers in a concise manner suitable for any conference or business meeting.
Elcomsoft Desktop, Mobile & Cloud Forensics booklet (web)
Elcomsoft Desktop, Mobile & Cloud Forensics booklet (print, 12 Mb)
Try our leaflets reflecting the key competitive advantages in our software bundles and client’s benefits. These handouts can be used in a variety of contexts, be it a business meeting or a trade show. The leaflets can greatly help in understanding of the possibilities of our solutions and contribute to a hassle-free order closure.
Elcomsoft Desktop Forensic Bundle
Give your business a boost by starting trainings with us! Please remember that we train both end users and partners. The partners that have received our training and certification have the right to independently conduct training for clients. Personal training is more effective than self-study and thus is always in high demand.
Training «Mobile & Cloud Forensics»
Training «Advanced Password Recovery»
Training «Password Recovery, Data Decryption, Mobile & Cloud Forensics»
Our White Papers explain how our products help in solving complex technical problems in gaining access to password protected or encrypted documents, disks or databases. Find out which products are appropriate in which situations.
«Secure Password Managers» and «Military-Grade Encryption» on Smartphones: Oh, Really?
An effective approach to restoring system access in Windows.
Advantages and disadvantages of EFS and effective recovery of encrypted data
Elcomsoft Distributed Password Recovery vs Hashcat (comparisons)
In our case studies you will find a number of real situations from our customers’ lives when our products helped them out in solving their issues. The users shared with us in detail what methods they used and what tools they chose. The value of these cases lies precisely in the reality of events.
Here you can find most of our recent presentations and talks at various conferences and business forums, including videos and slides in PDF. For each meeting with our partners and customers all over the world, we prepare an overview of the most interesting researches and developments of our company.
Cloud Forensics: Extracting Evidence from Apple and Google Accounts 23 April, 2020 |
|
Data acquisition from iOS devices. New approaches and possibilities. 5 March, 2020 |
|
Health and Activity Evidence. 29 January, 2020 |
|
The iPhone's Forensic Workflow: The Steps to Access Critical Evidence. 6 November, 2019 |
We welcome the use of our visual materials, including our logo, product icons or wallpapers on your website, in your articles, catalogs or social networks.